Q1. What are some other levels of protection that users might want to apply to code or data, in addition to the common read, write, and execute permission?
Q2. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.