Performing vulnerability but analyze: authentic or curated? Map vulnerability: authentic sharing vs. vulnerability performance vs. connection. Calculate: curated vulnerability vs. real sharing vs. connection. Show me the performance reality: curated vulnerability isn't vulnerable. Give me the truth: real vulnerability is messy. Include: whether vulnerability is curated, what authentic looks like, if performance connects.