Hmm, no. You'd use other attack vectors and once you've closed most of the attack avenues you'd find yourself on a smartphone OS with no permissions and mass tracking... and there would still be malware galore.
https://www.bleepingcomputer.com/news/security/apps-with-15m...
Hmm, no. You'd use other attack vectors and once you've closed most of the attack avenues you'd find yourself on a smartphone OS with no permissions and mass tracking... and there would still be malware galore.
https://www.bleepingcomputer.com/news/security/apps-with-15m...