Apple is not happy at all today with some of its critical source code having been posted online for the world to see.
The source code for the main component of Apple's iBoot system was leaked Wednesday on GitHub, a site widely used by programmers to store their code.
Ill-intentioned people could potentially find bugs that let them crack or decrypt an iPhone, despite the extra security steps added by the Secure Enclave Processor built into each new iOS device, or even emulate the operating system on non-Apple products. It's the very first process that runs when iOS starts up. It also loads and verifies that information is properly signed by Apple when your phone is booting up.
This week the bootloader source code for iOS seems to have leaked in its entirety.
Much of the security concern is mitigated by the fact that it appears to be tied to iOS 9, a version of the operating system released three-and-a-half years ago.
Disney Beats Earnings Expectations, Falls Short on Revenue
Disney announced separately that it's hired the creators of TV series " Game of Thrones " to make a new series of Star Wars films. Net income soared 78% to $4. 4 billion - largely as a result of the one-time benefit from the new federal tax laws.
If someone were able to discover a vulnerability in the iBoot code, they could theoretically break that security check, allowing unsigned code or code with a forged signature to be executed as iOS boots up.
While some may question the authenticity of this piece of code, several searchers have confirmed that it aligns with the reverse engineered code. The company insisted there is no security threat following the leak, which could lead to the discovery of system vulnerabilities and creation of iOS jailbreak. However, one clone of this code has already remerged on GitHub, meaning you can probably find it if you really really want it. We now don't know who is behind the leak, and Apple declined Motherboard's request for comment.