How to Security Research Without G