"An attacker can ask a phone for the contacts list, read or send SMSes."
Eli Biham

January 1, 1970