Please see the video talk and comment on the following questions in your response. Q1. What new techniques did you learn from the paper? What was unclear, if anything, from the paper? [2 points] Q2. State the differences in the isolation and permission checking mechanisms used by iOS and Android you noticed from the paper? [1 point] Q3. What do you think Apple can do prevent such attacks? Will it be secure against an attacker who adapts to your proposed defense? [2 points]