6.4.2. Video: transitional attack