There is no computer that always has secrets in it. It’s only reconstructed during those meetings. Then the bulletin boards don’t know enough to do any harm. They can in fact be run by different interested parties. It’s pretty robust.
j previous speech k next speech