0. Summarize the controlled-channel attack 1. Give an example of a computation or algorithm that, if ran inside the enclave, the controlled-channel attack could not extract any meaningful pattern that leaks about sensitive data.