If the protocols used for mobile networks were designed to be secure, most of the infrastructure couldn't do anything worse than a DoS attack. It'd still need some trusted servers for key management, but those could be standard hardware with relatively simple software.
replies(3):