Meaning that it is easy now only because that work has already long since been done and become ubiquitous. Not that it was trivial to conceive of or implement in the first place.
I don’t mean security in the contemporary hardened install sense. Even in just the basic administration sense of “set it up so that various users have unambiguous access to resources”. That’s a low bar, but arguably phones don’t meet it, because they aim to be deceptive about who actually controls the device.