That's cool. But don't you think this is kind of an exaggeration? I mean you are most likely not a spy, an undercover agent or high profile government secrets leaker, and we also know that all smart phones are vulnarible to all sorts of attacks including zero click RCE. So what is the ultimate goal of the setup that you have. What kind of problems you are trying to solve?