they all follow the same discrete steps: 1. Person A sends a signal of vulnerability. 2. Person B detects this signal. 3. Person B responds by signaling their own vulnerability. 4. Person A detects this signal. 5. A norm is established; closeness and trust increase.

