Apple confirms that the leak of the source code of iBoot of iOS 9, does not affect the security of the devices

A couple of days ago, and for a few hours, the source code for iBoot, the boot manager for the iPhone and iPad with iOS 9, appeared on GitHub. So that we understand each other, we are talking about the equivalent of the Bios of computers. Many security experts claimed that through this code hackers, governments and other people with bad intentions could access the terminal in versions later than iOS 9.

Unlike what Apple has accustomed us to, and being the umpteenth security problem that Apple has faced in recent months and which once again affects its reputation, the company has had to pronounce itself on the matter to clarify doubts and try to silence all those "experts" who have put their hands to their heads for what this code theoretically allows in current versions.

According to Jonathan Levin, a security expert, access to this source code makes it possible to search for new vulnerabilities that to this day have not yet been detected by Apple, which allows bypassing the restrictions and security measures that we can currently find in iOS. In addition, it also allows discovering new security holes that make it vulnerable to jailbreaking as well as being a possible access route to infect devices.

But it seems that what at first seemed like a catastrophe, one more, for Apple, this security expert is wrong. Apple has officially confirmed that if it is the boot source code for devices running iOS 9, a software that is three years old, but does not affect current devices, since it has been completely replaced in the latest version of iOS currently available on the market, iOS 11, and that moreover not only software is used to protect your data.

According to the statement that Apple has sent to MacRumors:

The old source code from three years ago seems to have been leaked, but by design the security of our products does not depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to upgrade to the latest software versions to take advantage of the latest protections.


You are interested in:
According to Apple, it is the most effective company in the world in security
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.