1) What happens when a user does not monitor their entry in the transparency log? 2) Explain in high level terms what is the privacy leakage of KT? Namely, explain what each of the following parties see: (a) Identity providers (b) Clients (c) Auditors