Example 3: Lottering Attack