I don't think theres a so-called perfect system, even though its technically like that but if you have met with other factors such as carelessness of the user then that perfect system is still useless. Even large b
anks with their so-called number one security in their class are still able to be exploited. If it still requires third party services then you can use escrow services.