Eh, typical "user hostile hardware and software" is not even in the same league as exfiltrating your data to an adversary.
Eh, typical "user hostile hardware and software" is not even in the same league as exfiltrating your data to an adversary.