← Back to context

Comment by bitwize

6 days ago

A compromised phone could be used in a botnet, and might even cripple the cellular infrastructure itself with a DDoS attack.

And if I compromise your Apple Watch, I can reprogram the baseband firmware into a radio jammer! We can never allow arbitrary code execution on that device for the safety of the public!

I think your lack of reasonable example speaks for itself.