The programs are executed in the environment isolated from the computer – donor. User data are encrypted on the device (by user choice) that creates a solid defense lo guard against hackers. System prevents all existing security problems: 1) Phishing – by using the pre-configured browser and applications, signed by a unique key. 2) Exploits – by working in an isolated environment and by signed programs. 3) Hacker attacks – by using built-in unbreakable crypto-storage.