How To Build Capped Privacy Part 2