Part 2: Make code hard to misuse