Three sides of the same breach conundrum