If you were intentionally designing a device to be easily hacked into and used for surveillance, I'm not sure what you'd come up with besides a "smart" phone. These devices are honeypots for their own users, especially when combined with "the cloud", which is a euphemism for "a computer that belongs to someone who suffers no repercussions if they lose your data or give it to the government."