Protocol vulnerabilities and hacks. Continuous auditing, layered security, and pro...