We learn again and again: there are no totally trusted environments