When an attacker gains root access to a mobile device, it seems like most security measures are bypassed. How do we approach threat modeling in such scenarios? What are the realistic risks, and are there any mitigation strategies that can still provide some level of protection for data and applications?