Surprise! A second leaflet on private data in AT, this time exploring some schemes that might be used to implement shared-private data. [Three schemes for shared-priva...]( )