Databases don't need to be huge collections of personal information waiting to be exploited. This talk will show how a few simple encryption functions can build a database that answers questions for the legitimate users but locks out all illegitimate users including those with the root password. The techniques make it possible to build privacy-preserving systems with much less complexity and overhead than conventional techniques.