PlatformSECURITYSECURITYProcess isolation Trusted vs untrusted code Sandbox strategy Permission boundaries