Vulnerability in Trusted Monitoring and Mitigations — LessWrong