While I partially agree, DH does need to be interested in security and preventing unwanted access. Once a hacker compromises an account, it becomes much easier compromise others. Read about the HBGary break-in. One the hacker was in based on a regular account, they exploited a bug in their un-updated kernel to obtain root access.
DH doesn’t always run the bleeding edge versions of software either, so there are likely exploits waiting to be hacked. The reason they don’t is that legitimate users a) know they will be tracked and b) don’t have anything to gain from compromising the system. Should an outsider get in… well, you get the idea.