He also said the attack can be combined with HTTP request hijacking to trick iOS apps into pulling information from an attacker's servers, allowing the miscreant to compromise the software by feeding it bad data.
Setting up a "No iOS Zone" is annoying, but being able to force victims to connect to controlled network from which a man-in-the-middle attack can be staged seems to be more severe. Different attacks for different goals, I suppose. As far as seeing it in the wild, it was used for a MitM attack, it would not be as noticeable as if the device started rebooting over and over. Time to stop wearing tin foil hats and start wrapping our phones in the stuff.