Please elaborate on your question, as I might have misunderstood it.
We were analyzing scenario when harvesting is being done on a computer that may belong to an adversary. Let's name person who harvests as Alice and the owner of the server as Bob. If Alice doesn't have a copy of the whole blockchain and a fork has happened then she can't decide which branch of the two is legit. Bob may use this to trick Alice into harvesting on his secret branch trying to do a double-spending.