@simon @profdiggity Regarding separating malicious zero-days from potentially malicious actions by phone operating system providers and associated ad networks, I think that's true, but I'm responding to the *feasibility* paragraph in your article, which I think is fairly weak. It's incredibly feasible, technically, and claiming it isn't seems silly to me.
I'm not convinced such carriers are doing so, but I think it's worth understanding the security aspect that it would be easy to do so.