diff --git a/README.md b/README.md
index 5a32cd0..9af9c56 100644
--- a/README.md
+++ b/README.md
@@ -54,7 +54,18 @@ However, consider a subsequent visit to the example.com page, after the `storage
Instead, we can imagine a different flow, where the user agent recognizes that the calendar widget already has `storage-access` permission and somehow knows that the widget wants to opt in to using it, so it loads the iframe with access to unpartitioned cookies. This would avoid unnecessary latency and power drain due to network traffic and script execution, leading to a better user experience. So, the flow could be:
-![sequence diagram of network requests with Storage Access request and response headers](./images/new_flow.png)
+```mermaid
+sequenceDiagram
+ Client->>Server: Sec-Fetch-Storage-Access: inactive
+ Server-->>Client: Activate-Storage-Access: retry
+
+ note left of Client: Client activates the
storage-access permission
+
+ Client->>Server: Sec-Fetch-Storage-Access: active
Cookie: userid=123
+ Server-->>Client: Activate-Storage-Access: load
+
+ note left of Client: Client loads widget
with SAA permission active
+```
1. The user agent requests the calendar widget's content.
* This fetch is still uncredentialed, as before.
@@ -77,7 +88,19 @@ At present, no web platform API allows loading this image via a credentialed fet
However, if the browser supports the headers described below (and if the user has already granted the `storage-access` permission to the appropriate `` pair somehow - e.g. via an iframe at some point in the recent past), then this scenario is supported by the browser as in the following sequence:
-![sequence diagram of network requests with Storage Access request and response headers for an embedded cross-site image](./images/embedded_image.png)
+```mermaid
+sequenceDiagram
+ note left of Client: Client is loading document...
+
+ note left of Client: Client begins fetching cross-site image
+ Client->>Server: Sec-Fetch-Storage-Access: inactive
+ Server-->>Client: HTTP/1.1 401 Unauthorized
Activate-Storage-Access: retry
+
+ Client->>Server: Sec-Fetch-Storage-Access: active
Cookie: userid=123
+ Server-->>Client: HTTP/1.1 200 OK
+
+ note left of Client: Client loads image and continues loading document
+```
Browsers that do not support the proposed headers will still receive the appropriate `401 Unauthorized` response. However, browsers that do support the proposed headers are able to retry the fetch and can send the user's credentials, since the user has already given permission for this (by assumption).
diff --git a/images/embedded_image.png b/images/embedded_image.png
deleted file mode 100644
index 86f06dd..0000000
Binary files a/images/embedded_image.png and /dev/null differ
diff --git a/images/new_flow.png b/images/new_flow.png
deleted file mode 100644
index 4e12861..0000000
Binary files a/images/new_flow.png and /dev/null differ