The Myth of Secure Computing