some of the protocols don't require trusted servers, but the picture you paint as the user locking you out is simply not true. I believe you offer a good service, but if users choose you under the impression of having sole access to the server/ram/disk/... it's just wrong, and that's what you are saying.