part two

Part 2: Make code hard to misuse