Lecture 18 Trusted And Untrusted Networks