If there's anything I've learned about the computing world, is that there's never anything that is absolutely immune to hacking or other forms of data loss/corruption. So in this instance, to each their own, and whichever method they prefer.