Care to elaborate how this applies? The article is about a switch. The alternative to a switch is to leave the device on full-time, or implement some self-resuming feature using a RTC. Both of those require constant power. I don't think any of this has anything to do with 'security/privacy implications', so some examples would be appreciated!