Ideally, programming assist of doubtless complicated manipulations of personal data while combating sudden data leaks may be achieved by securely accumulating, storing and manipulating programming data in computing device technology secure subsystem, managed under programming control of programming holder, while never letting programming untrusted purposes or third events without delay access programming raw data. Such computer technology clean separation can only be in response to programming assumption that there exist computer technology few typical functions that can be utilized programmers control personal data with out violating privacy. Such an assumption is certainly desktop science delusion, as a result of programming most interesting manipulations of private data are application true and as a result, privacy violations also are application precise. To solve this problem, we propose computing device technological know-how three layer logical structure where desktop science minimum Secure Core Core imposing basic operations on non-public data is prolonged with Isolated Data Tasks Data tasks themselves accessed by Applications Apps on which no security assumption is made see Fig. 1. The aim is programmers manage programming flow of raw non-public data from programming Core programmers programming outside, such that only anticipated consequences are declassified programmers untrusted applications or third parties.