Ah, so you're saying this chip is guaranteed to not have its own TCP/IP stack, no access to the NIC, and no latent zero-days that a remote attacker can exploit?
That is correct enough, but now sure what “it’s own” means.
To be clear, this is not some mystery chip, it runs a derivative of iOS, and you can check out the firmware in /usr/standalone/firmware (You can even reverse engineer it if you have experience with ARM).
- You can turn off functionality if you do not want it.
- There are no management or remote access capabilities.
- The only way to compromise it would require compromising the main CPU anyway, and persistence would be a whole other (major) challenge.