social policy
and hot for teacher, man the world is changin' but fast...
For the iPhone gotta-have-it's
http://www.eweek.com/article2/0,1895...LNAV100307FEA1
All iPhone applications run with full root privileges and any application vulnerability means winner takes all.
The iPhone has been turned into a "pocket-sized … network-enabled root shell," said H.D. Moore, thanks to the well-known security researcher having published shell code for the smart phone and instructions on how to use it as a portable hacking platform