Ok, so I assume they have a short life. I worked on the exploits business for other platforms/apps and you need to invest a lot for finding one. Once they are alive and 0-day discovered the vendor fix them.
I assume the advantage here is the Apple difficulty to access these devices?
They only have a short life when you aren't constantly adding new attack surface every year/iOS release. They will always have a steady pipeline with or without the maker's direct cooperation
I assume the advantage here is the Apple difficulty to access these devices?