I wasn’t aware of the article but I do ask myself this question, especially when faced with an “explanation problem”. I wrote a little about it here, perhaps of interest to those working in cyber security or curious about it. I used a bit of inspiration from the great Feynman to come up with a new form of breach diagram.<p><a href="https://blog.eutopian.io/documenting-breaches-with-h-diagrams/" rel="nofollow">https://blog.eutopian.io/documenting-breaches-with-h-diagram...</a>