I know there's more to this but I really hate the way that journalists report on things like this. Based on the article, it makes it sound like someone just needs to send you a blank email and then they have full access to any iPhone since 2012. The reality is that the attacker would have to send an attachment or email with a specific payload and then somehow run that payload which would have to include another exploit specifically for the kernel.<p>In any case, I'm glad to see that this has been patched and will be out soon. I wonder how many cases have actually been compromised and exploited out in the wild.