I appreciate the link. I get the sense that he is putting out a lot of content because he’s doing updates for his project, along with broad strokes videos for why folks should care about the issues, and also nuanced takes for specific topics, so I couldn’t cut through the noise to find the signal, as I haven’t followed his content closely, but I did like what I saw.
yeah the definitely not as succinct as it could be. They all seem to pad out content with the same generalities. But fair enough, there is no foolproof solution looks like
Print this out and you can take notes on the back of the page, or even read it if you get bored while you're out and about without your device, to remind yourself why you don't really need your phone:
> Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
> Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick
I can't emphasize this enough: it is extraordinarily rare for malware to persist after a reboot on iOS. These examples are of devices that faked the shutdown sequence (in other words, the exploit did not achieve persistence). iPhones have a hardware-level reset capability: quickly press volume up, volume down, then press and hold the power button.
Enable Lockdown Mode to prevent the vast majority of exploits, then reboot using this method once a week. You'll be fine, as far as this specific threat is concerned.