Getting better and better
An exploit that can survive a factory reset?
Is the source of this marvel of technology also included in the data dump?
What level of interaction is required by the user? Does he have to execute some pownme script or is just receiving a mail/SMS containing the troyan already enough?