I am doing a survey of supply chain attacks, and I find it very annoying how 95% of the analysis is on payloads rather than compromise vectors.

Yes, you are a very smart reverse engineer and you figured out a very clever payload. Yes, rolling out phishing-resistant auth is a slog. No, this is not how we make actual progress.

</rant>