Social Constructionism in Security Protocols (Transcript of Discussion)