(Question#1) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (Question#2) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm