Text this: Chapter 8 The Logics of Vulnerability