can not be 100% true as far as my work since last 10 years on various security solutions especially sandboxing (real-time) and inprivate filtering or incognito browsing (non-real-time)
part 1
Just consider a case
A person uses UC browser and downloads a malicious file on its SD card then...