Hi, Punk Stasi, The docs describe a significant portion of a suite of vulnerabilities inside phones that demonstrate that _most mobile phones today_ can be _remotely controlled by anyone with tools or skills_. This is more meaningful than, say, a cpu exploit, because everybody has one and it can be done wirelessly. People have been discussing these kinds of vulnerabilities since smartphones became common, and how the industry has been designing phones in a way that does this, but for me it has been rare to see backing documentation like this, especially with so many parts. The research can be quite laborious. It's important to be able to disconnect your radios from your computing equipment. The inability to do this is a clear push to take power from the common people, one that can be discussed and engaged in the mainstream.