How Can An Adversary Use Information