It's the difference between saying:
1) I believe the UTXO checkpoint is valid because people built on top of it. (SPV-like, depth-based)
and
2) I don't have to trust any checkpoint, I computed the address balances from the beginning of time.
I'm not even trying to argue about a practical attack, I'm simply explaining why they're different. They are.