It’s not the same thing. If you don’t have software that stitches the bits together then the data is meaningless to you. If someone breaks into your node to install software to do that, they are committing a criminal act in order to effectively plant evidence on your machine that you couldn’t ...