. "In the end, what we need is a solution that allows untrusted code to run safely and trusted code to protect itself from attack by the broken platform and its malicious demon controller." . . .