Correct.. no matter how you try to encode logical constraints to achieve security in software, no amount of logic can prevent the exploitation of logic.