In the course of scores of conversations about security, I have regularly elicited a gobsmacked silence with a simple question: “How do you reliably secure access from an untrusted computer?” We at ...