Skim through the SFSRO paper. Read SUNDR more carefully. Q1: Can a malicious file server serve fake data in SFSRO? Why and why not? SUNDR: Q1: What are the possible attackes if the file server is malicious? Can it serve fake data in SUNDR? Why and why not? Why isn't a signed directory tree (like that in SFSRO) not enough? Q2: How about malicious clients? What attacks can they carry out?