Isn't this rather a security theater for the more naive prospective buyers? Even if the device is verified to comply with high-level schematics, it still may not comply on the micro-level. There is the problem with all modem chips being able to access/control phone memory and being potentially controllable by the mobile network operator. How are we going to verify this vulnerability has been removed?