C2PA from the Attacker's Perspective