- There's no need to know who the attacker is

View Context