Comment by bitwize
7 days ago
A compromised phone could be used in a botnet, and might even cripple the cellular infrastructure itself with a DDoS attack.
7 days ago
A compromised phone could be used in a botnet, and might even cripple the cellular infrastructure itself with a DDoS attack.
And if I compromise your Apple Watch, I can reprogram the baseband firmware into a radio jammer! We can never allow arbitrary code execution on that device for the safety of the public!
I think your lack of reasonable example speaks for itself.