Might as well eliminate the attack surface entirely, and ban computing.

In a way yes that’s how enterprise endpoint software works.