dc32f0cfe84def651e0e Will work well as an unbloated smartphone with nothing-to-hide contents.
Even if the device itself has "nothing to hide", if it has access to networks then it could be compromised and used as a platform to attack other devices, either by participating in a DDoS network or by allowing lateral movement through an in-home network.
If such a device didn't have any network credentials, so it genuinely couldn't use any networks, and it were being used as a 100%-offline e-book reader, or as an alarm clock, or as an offline GPS map for a bicycle, that might not pose a threat. But providing a device that is subject to remote code execution attacks with network credentials is not clearly prudent.