A common and effective computer security practice is to keep sensitive information on computers that are locked up and disconnected from the world. I don’t propose that but this model can serve as metaphor in our design space. Thus the problem is solved in both theory and practice.

The metaphor may be relevant to graphic presentation of security arrangements. The cut and paste metaphor must be coordinated with the separated machine metaphor.