The path to invisible security