... move the spying right to the edge, to the user of the computer, the owner of the computer. ...
... to leave the underlying computer and its programs intact, so that when the owner takes it back, ...