How would a non-insider have access to that kind of protocol detail? I have no idea, DewDiligence. Go there and search on "efficacy boundary", and you should find it. I presume it's from the original protocol (if authentic).