If I own a computer, I want
full control over it. That's why it matters to me.
You know what? I added that part without even thinking about locked or read-only files. Still, even if it's like that, some hackers out there might find a way to get past that and modify the main files of the phone.
Once again, what?
How would they log in from a different device in the first place? The only way I could think of is if you were dumb enough to just leave an SSH server on and not disable password authentication, and even then they would have to be on the same network unless you forwarded port 22 on your loving iPhone. And if they were able to log in to my phone, how would making a file read-only help? And what do you even mean by "locked" files?