Outsourced Databases: 1. What was the most significant lesson you learned from the paper? 2. What was the weakest/most questionable part(s) of the paper or how could the paper be improved? 3. What goes wrong with the scheme described here if there are multiple clients that can read and update the data on the server? Certificate Transparency: 4. Suppose both a certificate authority and a CT log server is compromised by an attacker, who generates a fraudulent certificate from the CA, adds it to the log, uses it to attack a target user, and then removes it from the log. Could this be detected by others (other than the target)? 5. Optional: What topic would you most like to see discussed in class, or question you would most like to have answered, if any?