A problem with this strategy is that a client is restricted from using your service from a single machine and a single user account on that machine unless user profiles are truly distributable across many machines, but again the access is limited to those infrastructures that maintain roaming profiles. It nevertheless is the most secure strategy but at a cost that makes is quite infeasible to deploy in the real world.
perl -e '$,=$",$_=(split/\W/,$^X)[y[eval]]]+--$_],print+just,another,split,hack'er