most embedded devices are “closed”, in the
sense that there is no straightforward way to attack the
embedded software and affect its operation, but mobile
platforms are open, allowing the installation of new
“malware” applications that can affect the overall
operation of the device, including the surreptitious
transmission of local data by such an application.