Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)