● Brands like Samsung and Apple claim various layers of security as in this video.
https://mobile.twitter.com/SamsungMobile/status/1372472854424485889
All a hacker needs to bypass is an exploit (browser based for instance).
And container and other mechanisms fail of the exploit just has small feature like record screen video.
No data is touched directly.
https://t.me/cKure/7258