x
Vulnerability in Trusted Monitoring and Mitigations — LessWrong