Naked Exclusion, Efficient Breach, and Downstream Competition