Why did you edit out the third paragraph about finding a single exploit on target being slanted against having to secure a whole system?