Apple security is multi-layered, but users should still update to the latest possible version of iOS to make sure they're protected.
Apple later issued a statement confirming the iBoot source code leak, but the company said the code was 3 years old and added that, "by design, the security of our products doesn't depend on the secrecy of our source code".
According to these sources, the person who stole the code didn't have an axe to grind with Apple. "It is not open-source", read the takedown request.
The plan was originally to make sure that the code never left the initial circle of five friends, but apparently the code spread beyond the original group sometime past year. The "iBoot" starts up the system when the iPhone is first turned on.
The codes in question pertain to the "iBoot" process of iOS. It ensures that the code being run is valid and is from Apple only.
Apple though ruled out any such possibility claiming the iBoot process that has got leaked pertains to iOS 9. Before the iBoot leak, ZioShiba had been inactive on GitHub for at least seven months. Essentially, it is like the BIOS code found in PCs.
iOS bootloader The leak could be of value to "jailbreakers" who install third-party software on iPhones and iPads. Many people ignored it because the user had a short history of posts.
Along with attracting hackers, the iOS source code could also help tech-savvy consumers "jailbreak" their iPhones. "But the leak of this source code is proof that no environment or OS is infallible, and application protection from within the application itself is crucial, especially for business-critical, data-sensitive applications", says Carter.
He continued: "iBoot is the one component Apple has been holding on to, still encrypting its 64-bit image. now it's wide open in source code form".