What exactly is he saying that's wrong? Using Apple hardware (Layer 1), isn't going to change anything if your OSI Model devices(Your communication system/model, which includes switches, routers, gateways, "people" or anything that interacts with your secure hardware, etc.) is subject to compromise.
In other words, you can have the most secure bank vault in the world, but if the guy that carries stuff into and out of the bank vault is a thief, it's not going to make any difference.
Not exactly. That’s why I said I hate to be pedantic.
This might help clarify a bit. You can’t simply call any “hardware” an OSI model Layer 1 device. There is a full stack in any iphone or android device, and not neccessarily a full stack in many network devices.