{"id":1562,"date":"2018-02-09T18:34:35","date_gmt":"2018-02-09T17:34:35","guid":{"rendered":"https:\/\/werle.pro\/?p=1562"},"modified":"2018-02-09T18:34:35","modified_gmt":"2018-02-09T17:34:35","slug":"ileak","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2018\/02\/09\/ileak\/","title":{"rendered":"iLeak"},"content":{"rendered":"<h4><a href=\"http:\/\/www.telegraph.co.uk\/technology\/2018\/02\/08\/secret-iphone-code-published-online-biggest-ever-leak\/\"><img loading=\"lazy\" decoding=\"async\" class=\"shrinkToFit alignleft\" src=\"https:\/\/i0.wp.com\/www.telegraph.co.uk\/content\/dam\/technology\/2018\/02\/08\/TELEMMGLPICT000147735659_trans_NvBQzQNjv4BqIkUhv7k5mil0w0oeVCztIhVrDwi3LvLa62XQyE1Z5U4.jpeg?resize=297%2C186\" alt=\"https:\/\/i0.wp.com\/www.telegraph.co.uk\/content\/dam\/technology\/2018\/02\/08\/TELEMMGLPICT000147735659_trans_NvBQzQNjv4BqIkUhv7k5mil0w0oeVCztIhVrDwi3LvLa62XQyE1Z5U4.jpeg?resize=297%2C186\" width=\"297\" height=\"186\" data-recalc-dims=\"1\" \/><\/a><a href=\"http:\/\/www.telegraph.co.uk\/technology\/2018\/02\/08\/secret-iphone-code-published-online-biggest-ever-leak\/\">Secret iPhone code published online in &lsquo;biggest ever&rsquo; leak<\/a><\/h4>\n<blockquote>\n<footer class=\"footer-author\">\n<div class=\"byline component  \">\n<p><span class=\"byline__author-name\"> by <a href=\"http:\/\/www.telegraph.co.uk\/authors\/margi-murphy\/\">Margi Murphy<\/a> <\/span><\/p>\n<\/div>\n<p><span class=\"article-date component   \"> <span class=\"component-content\"> <time class=\"article-date-published\" datetime=\"2018-02-08T11:26+0000\">8 February 2018 \u2022 11:26am<\/time> <\/span> <\/span><\/footer>\n<article data-insert-mobile-adslot=\"\">\n<div class=\"articleBodyText version-2 section\">\n<div class=\"article-body-text component  version-2\">\n<div class=\"component-content\">\n<p><span class=\"m_first-letter m_first-letter--flagged\">A<\/span> secret part of\u00a0Apple&rsquo;s iPhone software has been posted online in a leak that could potentially allow hackers to find security holes in the smartphone.<\/p>\n<p>Although the release does not immediately put iPhone owners at risk, security experts said the leak\u00a0enables hackers to analyse Apple&rsquo;s code, replicate and manipulate it for malicious purposes and that\u00a0users could be vulnerable in the future.<\/p>\n<p>On Wednesday night, an anonymous user published part of the \u00ab\u00a0source code\u00a0\u00bb &#8211; the computing\u00a0instructions that underpin the iOS software &#8211; on GitHub, a website for computer programmers to share code.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Secret iPhone code published online in &lsquo;biggest ever&rsquo; leak by Margi Murphy 8 February 2018 \u2022 11:26am A secret part of\u00a0Apple&rsquo;s iPhone software has been posted online in a leak that could potentially allow hackers to find security holes in the smartphone. Although the release does not immediately put iPhone owners at risk, security experts &#8230; <a title=\"iLeak\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2018\/02\/09\/ileak\/\" aria-label=\"Read more about iLeak\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/s7ALXt-ileak","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1562"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=1562"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1562\/revisions"}],"predecessor-version":[{"id":1563,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1562\/revisions\/1563"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=1562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=1562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=1562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}