These attacks generally work either by manipulating the display of the sensitive element— by making it transparent or partially obscuring it in a clever way— or by suddenly displaying sensitive elements just before users click in a predictable place.