Apple is famous for being the most secretive company in the world, but since the launch of the iPhone, the company has had trouble preventing leaks about the upcoming iPhones and devices. However, the leak of the iOS 11 GM builds last night including the build for the 10th anniversary iPhone, has been the mother of all leaks in Apple’s history.
The leaked iOS 11 GM build has not only revealed the official names of the 2017 iPhone lineup, but it confirmed iPhone X’s design and has provided details about how Face ID, Apple’s new face recognition feature that will be replacing Touch ID, will work. It also provides details about how the Status bar will work with iPhone X’s new notch design, and also details about the new iPhone X camera feature that will allow users to create custom 3D animated emoji using facial expressions.
The leaked iOS 11 firmware also revealed details about the new Apple Watch Series 3 and revised AirPods which Apple is widely expected to unveil at the September 12 event.
You can also download all the new iOS 11 Wallpapers that would look great on iPhone X’s OLED display.
The person who leaked the URLs seems to be a disgruntled Apple employee. While we love to report on leaks, it is quite unfortunate as the person has let his or her fellow teammates down who have been working hard on the 10th anniversary iPhone for probably more than a year.
John Gruber of Daring Fireball writes:
As best I’ve been able to ascertain, these builds were available to download by anyone, but they were obscured by long, unguessable URLs. Someone within Apple leaked the list of URLs [..]
[..] I’m nearly certain this wasn’t a mistake, but rather a deliberate malicious act by a rogue Apple employee. Whoever did this is the least popular person in Cupertino.
The URLs might be unguessable but it is quite surprising that the URLs were accessible to anyone, especially since it is quite easy to dig through the contents of the firmware. You would expect a company like Apple to password protect such URLs and also add another layer of security such as two-step verification, which could have helped in identifying the source.
We are sure Apple will launch an investigation to find the person who leaked the URLs, but the damage has been done.