. "much detail as possible, including details about how to exploit the" . . .