Moving Insecurity
Use layered security -- protect a weak point with some other mechanism.
Example: cryptography protects a link, but relies on the security of keys. These are (usually) easier to safeguard.
Example: firewalls can be attacked, too, but they’re (often) running simpler, cleaner code.