50. How do you use the definition of ‘end-to-end’? And more specifically, what is the beginning and what is the end of communication?
60. How can lists containing details of potential or as yet unconfirmed owners of possible child pornography be prevented from ending up on the street? (ending up in a data breach)