Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)