Black's problems seem to have started with the idea that |8.n7 could form a viable threat across the top to the left (over i9). Instead, maybe |8.o10, because it's downstream to both j13 and L17, and by that I mean 9.m1510.l1211.m1112.m1013.n914.n8 and 9.j1210.n1611.o1512.o1413.p1314.p1215.q1116.q9. Both of those lines are just to demonstrate the threat. What one might actually expect in response is something like 9.h17 or 9.j14 or something else that breaks both of the above threats.

SamDakotasaid:If 25.l5 then 26.j8

if 25.i8 then 26.h9 with either 27.h10 28.m5 or 27.l5 28.j8

Alan Henselsaid:Black's problems seem to have started with the idea that |8.n7 could form a viable threat across the top to the left (over i9). Instead, maybe |8.o10, because it's downstream to both j13 and L17, and by that I mean 9.m15 10.l12 11.m11 12.m10 13.n9 14.n8 and 9.j12 10.n16 11.o15 12.o14 13.p13 14.p12 15.q11 16.q9. Both of those lines are just to demonstrate the threat. What one might actually expect in response is something like 9.h17 or 9.j14 or something else that breaks both of the above threats.