Treacherous computing