If the system is unusable some well-meaning user will set up their own system, which is unlikely to be secure.