Probably, at least in practice if no critical components in the chain fail due to bugs/exploits and are as secure as intended (excluding the metaphorical "hammer VS fingers" attack).
I think the difference here between you and the poster you replied to is that you're probably correct given certain assumptions but the earlier post also remains correct in a conceptual or theoretical sense, like pure information/security theory
I think the difference here between you and the poster you replied to is that you're probably correct given certain assumptions but the earlier post also remains correct in a conceptual or theoretical sense, like pure information/security theory