Talk:Shard Manipulation/@comment-49.244.100.55-20120409193315/@comment-70.32.205.116-20120409201655

There is an opening point between the user and the shards they manipulate. Find the opening spot or area and the user will be vulnerable to attack.