Regardless: as a software employer, I'd currently treat any contributor device as loaded with malware, under surveillance, potentially hostile, and with the possibility that it will reside on competitor networks in future.
Ultimately most of the contributions I'm looking for are plaintext and reviewable -- none of the above properties should be blockers, so the way to maximize contributions is to allow for all of them.