Would they detect this if the attackers just silently keep leaking the information, as opposed to go destructive about it?