Do you think at this point in IC, there's just a lot of really powerful voters that don't actually verify every line of code, that could damage the security of the IC by voting Yes for covert malicious code? What are some tools that can help prevent that?