“But if you have access to the full source code, it makes the process substantially easier.”

The code can also serve as an analysis framework for security controls that can then be overridden."

Unlike the system source code mentioned previously, the bootloaderislike having the keys to the city.

Closeup of someone using a smartphone against a dark background.

d3sign / Getty Images

Just venture to stay as current as possible with security updates, and avoid taking unnecessary risks online.

They should also be very careful about leaving their phones unattended, particularly if they travel outside the US.

This is true even if the equipment is password- or biometric-protected."

Closeup on a computer screen that has an option called ‘Update Software.'

LPETTET / Getty Images