[QUOTE="W"]\nSo what? I never said that one program would access any part of any other\nprogram. People keep repeating this point, as if it is a requirement for\na Trojan. It is not.\n\nIf a program can behave like a cell phone, and make calls, inspect common\naddress book information, open data connections to a remote host, etc,\nplenty of mischief can be done.\n\nI understand that such a program might not get root access and might not\nhave access to other applications. That gives me little comfort.[/QUOTE]\n\nTake whatever comfort you can get from whereever. My sense in reading\nall you've posted so far is\n\n(a) you're either a troll trying to argue to keep this thread going\nbecause you don't really have any interest in listening to what others\nare offering\n\nOr\n\n(b) you believe the paranoid fantasy you've concocted about what "they"\nare doing to mess up your system where they are "Apple", the "NSA", and\nthose people that floridate your water. Maybe less time in the day room\naway from the computer is in order.\n\nHave fun with that tin foil hat, troll boy.