[0. Summary of the readings] 1. What is the difference between soundness and proof of knowledge? When is the latter useful? 2. Explain in a sentence how one could use zero knowledge proofs to convert a semi-honest MPC protocol into a malicious one.