yeah the definitely not as succinct as it could be. They all seem to pad out content with the same generalities. But fair enough, there is no foolproof solution looks like
Print this out and you can take notes on the back of the page, or even read it if you get bored while you're out and about without your device, to remind yourself why you don't really need your phone:
> Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
> Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick
I can't emphasize this enough: it is extraordinarily rare for malware to persist after a reboot on iOS. These examples are of devices that faked the shutdown sequence (in other words, the exploit did not achieve persistence). iPhones have a hardware-level reset capability: quickly press volume up, volume down, then press and hold the power button.
Enable Lockdown Mode to prevent the vast majority of exploits, then reboot using this method once a week. You'll be fine, as far as this specific threat is concerned.