vulnerabilities. By the time we finished, we had a defensive strategy that accounted for
ng. Instead, it felt like we