And?
We design phones around the same concepts as we do computers, then act surprised when they exhibit similar vulnerabilities?
We design phones around the same concepts as we do computers, then act surprised when they exhibit similar vulnerabilities?