Exactly my point. Only 1 uneducated user is exploited. If you use an OS that commonly has privilege escalation exploits, such as Windows (http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k), than the computing knowledge of the user is negated by the exploit not requiring authentication; even knowledgeable users get exploited to the degree that the whole system is exposed.
What I fail to grasp is how this method he's describing is any different from me downloading a trojan on my own. They can do the same thing. However like you said, it requires the user to do it.