It would not. It's really as simple as that, saying as someone with two degrees in cyber security and 7 years of experience as a security consultant for various companies from small shops to multinational businesses, banks, and insurance companies.
I would love to see their threat modelling to justify what they're saying to brainwash their acolytes... It's a pure strawman to justify their bullshit.
Just google it. This is just the first result, normally you'd remove the spine so you don't have to turn the pages. The book in the other video is a special one that should not be destroyed, and since that fancy shmancy thing from my link is probably more expensive than my socks, it's done manually.
Don't you think there are better, more recent examples of this?
(Oh, I missed the instance I was on lol)