Wen Xing comments on Vulnerability in Trusted Monitoring and Mitigations