"The customer is a potential target for spy operation, and the device shall provide him the best possible protection so his docs will not be stolen, or sometimes will not be stolen without leaving behind security warnings or traces, or indications that the secrecy of the document is probaly under threat." . . . .