Many of these exploits don’t require that the person using the phone even knows they’re in use bud. You do you, but know that your phone will likely be hijacked to be used as a crypto miner at best. At worst literally all your data will be exfiltrated.
This was true until Edge transitioned to Chromium. Now the natively installed browser in Windows is Chromium based.