I'm sure there are, remember the bezos hack? Wasnt it a video from snapchat on iphone or something? But mostly the ones coming from Apple seem to be physical access only. You can assume, as with any personal computing device, once it's in someone else's hands, your data is as good as theirs.
Some make it more difficult than others. But 400 remote access vulnerabilities is a completely different ball game.
Some make it more difficult than others. But 400 remote access vulnerabilities is a completely different ball game.