“As best I’ve been able to ascertain, these builds were available to download by anyone, but they were obscured by long, unguessable URLs [web addresses],” wrote John Gruber, a blogger known for his coverage of Apple.
- a reference to iPhone X, which acts as fresh evidence that Apple intends to unveil a high-end model alongside more modest updates to its handset line
- images of a new Apple Watch and AirPod headphones
- a set-up process for Face ID – an alternative to the Touch ID system fingerprint system – that says it can be used to unlock handsets and make online purchases from Apple, among other uses
- the introduction of Animoji – animated emoji characters that mirror a user’s captured facial expressions
In a time where major entities and prominent individuals are proving to be vulnerable to attack through leaks, it’s important to secure digital means. How can Apple continue to make itself susceptible to these kinds of attacks? Perhaps it’s blowback? Perhaps those saboteurs (likely disgruntled former employees) think Apple isn’t too big to fail anymore?