Possible Responses to these Vulnerabilities