1. Summarize the security and privacy properties of CONIKS. 2. Say that Bob goes offline for a period of time and then comes back online. Describe what a malicious identity provider can do during this time period, and what happens when Bob comes back online.