Yes. Apple (finally) incorporated memory tagging into their latest iPhones and called it Memory Integrity Enforcement because of that.
Their article provided examples on how memory tagging and secure allocators mitigated PoC exploit chains.



What comprises the most dangerous vulnerabilities for these big projects like Linux and Chromium? Memory corruption. Android uses Linux and many major vulnerabilities are inherited from it.