Building a trusted computing base
Side-effects