11This technique was also used to find inconsistencies in the checksums produced by the good bootloader when we were developing it.