Comment Re:Bet on the hackers (Score 2) 39
Not too long. It's defense in depth; it's not meant to be outright impenetrable, just very (very) hard to get through.
Someone with enough drive, enough time, and enough resources will eventually put together an exploit chain that doesn't require an invalid tagged memory access. But if that raises the manpower requirement by 10-fold (to pull a number out of my ass), then it makes it that much more expensive to attack a phone. At some point, the Apple juice won't be worth the squeeze.