Return to Article Details Overcoming vulnerability by editing the germline? Download Download PDF