I love reading the air gap transmission stuff all the time, but something the casual viewer probably won't pick up on, is that both devices have to already have a virus on it.
This does not gain you the initial foothold in the hacker methodology.
This is useful for the post exploitation phase.