@slyecho the machine either has the authorization to delete data or it doesn't. it doesn't matter one bit what software it's running if it's compromised