Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
NuPhoto / Getty Images
Source code used by Apple to securely boot iPhones leaked online and was widely distributed until Thursday morning, when Apple used copyright law to get the code taken down. Newer iPhone models have additional security measures that will likely mitigate any security problems.
Why it matters: The source code gives malicious actors an unprecedented look at the internals of one of iPhone's key security features. But even if attackers could use the code to discover vulnerabilities in iOS 9, that does not mean most iPhone users are currently at risk.
How it works: The code, posted to the programming repository GitHub and first spotted by reporters at Motherboard, controls the iBoot function in iOS 9. iBoot checks to make sure the operating system is authentic before booting the phone.
iOS 9 isn't the current iOS, but it also isn't nothing: iOS is currently at version 11, meaning the code is likely out of date. And nearly all phones in the Touch ID era include a "secure enclave" processor — a processor that makes it much more difficult to tamper with the boot process.
Still, for legacy phones or by potentially pairing the leaked code with future vulnerabilities in boot security, it may provide some additional security risk.