Instructions: By Tuesday, 10:00 AM, send email to the course staff email alias (which is available on the home page) in which you: Question. Assume that OKWS is deployed and that its approach to separation is implemented correctly. Assume that pubd has a vulnerability and that an attacker exploits that vulnerability. (1) Give an example of damage that can be done by such an attacker. (2) Give an example of something that such an attacker cannot do; your example should be something that such an attacker could have done, if all of OKWS's logic were executing in a single process.