[0. Summary] 1. Google's secure aggregation protocol assumes an honest but curious server attacker. Given an example of what can go wrong in their protocol if the attacker compromising the server is in fact active/malicious.