Order of the three pre-hacking phases?