I think the crux of it is that the virtualization layer does not block the bug.
But I need to find the references. I'm not clear yet on every detail.
thank you. because the VM runs through a virtualization layer i dint know it the attack could break through or not since i thought that was one of the primary reasons to run a VM
Is there anything like a VM on smartphones?