Except they keep giving their private keys to every device and app they want to try, or they give their private keys to nsec bunker, which most often is a trusted custodial.
You can't twist people arm, if they want delegation they will and do delegate, the question is whether they can recover from that delegation or not.