Assume your devices are compromised