Thinking Differently about Secure Computing