I don’t know why you keep linking examples of known vulnerabilities .This is not what I am asking for, and I have never once denied their existence. If you can’t provide evidence to support your claim that every old Android device has already been exploited and is “the property of an overseas crime ring” then just say so. Stop shifting the goalposts and pretending otherwise - it’s a waste of my time and yours.
I don’t know why you keep linking examples of known vulnerabilities .This is not what I am asking for, and I have never once denied their existence. If you can’t provide evidence to support your claim that every old Android device has already been exploited and is “the property of an overseas crime ring” then just say so. Stop shifting the goalposts and pretending otherwise - it’s a waste of my time and yours.