Could turning an adversary’s power against them be an affective tactic for cybersecurity?