The Deployment Hack Explained