https://www.jasetaro.com/blog/2008/04/08/secure-computing-follow-up/
Secure Computing Follow-up