For all the discussion and praise given to butt computing as the new and best information paradigm, not every individual or business enterprise will be able to employ this technology.
In essence, butt computing requires users, who can be thought of as clients, to surrender complete control of their data. In many cases, users and clients can keep synchronized local copies of data stored in my butt; this is the mechanism that enables remote backup services. Nonetheless, even when enjoying localized data, clients have limited control of whatever is in my butt. Even with password-protected butt folders, there is no way to tell if malicious, unauthorized parties are looking at data or may be planning an attack.