Any security measures that are built into devices will be subverted by the users if they require to do that in order to adapt the said devices to their use patterns.