Apple Sues YouTuber Jon Prosser Over Alleged iOS 26 Leak Involving Stolen Development iPhone

Apple iOS 26

In a major legal move underscoring its commitment to secrecy, Apple has filed a lawsuit against popular YouTube personality Jon Prosser and codefendant Michael Ramacciotti, accusing them of misappropriating trade secrets tied to unreleased features of iOS 26. The suit, filed in the Northern District of California, claims the duo orchestrated unauthorized access to a confidential development iPhone and used its contents to publicly showcase mockups of Apple’s next-generation software.

According to court documents obtained by MacRumors and BGR, Apple alleges that Prosser and Ramacciotti engaged in a “coordinated scheme” to break into the iPhone of Ethan Lipnik, an Apple software engineer. Lipnik, who had access to an unreleased version of iOS – internally still referred to as iOS 19 at the time – was reportedly unaware of the plot, which allegedly unfolded while Ramacciotti was staying at his home.

Apple’s Allegations: Access, Capture, and Disclosure

Apple claims Ramacciotti waited until Lipnik was away for an extended period, using a location-tracking tool to confirm his absence. With Lipnik’s passcode in hand, he reportedly unlocked the development iPhone, initiated a FaceTime call with Prosser, and showcased new iOS features, including app redesigns and interface elements.

Prosser allegedly recorded this video call using screen capture tools and later shared the footage with others to generate detailed renderings. These mockups appeared in several videos on his Front Page Tech channel, including a January preview of a redesigned Camera app, a March segment showing an updated Messages interface, and an April reveal of Apple’s forthcoming “Liquid Glass” design aesthetic.

While some features showcased by Prosser did not match Apple’s final WWDC 2025 reveal of iOS 26, many details were remarkably accurate. Apple believes this was no coincidence and instead the result of unauthorized access to sensitive data.

The Backstory: Motive and Means

The lawsuit further alleges that Prosser, aware of Ramacciotti’s financial needs, offered compensation-either monetary or via future employment-for help in obtaining Apple’s confidential information. Lipnik, who was friends with Ramacciotti and often hosted him on weekends, was reportedly unaware of the scheme as it unfolded.

However, once the renders were made public, acquaintances of Lipnik recognized his apartment in the background of the footage. When confronted, Ramacciotti allegedly confessed to the breach and claimed that Prosser had orchestrated the entire operation. Apple also cites a voice note in which Ramacciotti apologizes to Lipnik and confirms Prosser’s role.

Although Lipnik himself was not accused of participating in the breach, Apple terminated his employment for failing to secure his development iPhone and for not reporting the incident upon learning of it.

Legal Action: Injunctions and Damages

Apple is pursuing legal remedies under the Defend Trade Secrets Act, seeking both injunctive relief and unspecified monetary damages. The company has asked the court to prohibit Prosser and Ramacciotti from disclosing or using Apple’s proprietary information and to order the destruction of any related materials in their possession.

Significantly, the lawsuit notes that the accessed development iPhone may contain additional trade secrets that have not yet been made public-raising concerns about the full extent of the exposure.

Prosser Responds: Denial and Defense

Responding publicly on X (formerly Twitter), Prosser disputed Apple’s version of events, stating: “This is not how things went down on my end. Looking forward to being able to speak to Apple about it”. He added that he did not “plot” to access anyone’s phone and was “unaware of the situation playing out”.

Prosser, whose YouTube channel has over 550,000 subscribers, is known for accurate Apple predictions in the past. His supporters point to Apple’s vast supply chain and leaky internal ecosystem as part of the broader challenge the company faces in maintaining secrecy.

Looking Ahead

While Apple has previously taken action against internal leakers, this lawsuit marks a rare case involving a high-profile external content creator. Comparisons have been drawn to Apple’s legal battle with the now-defunct Think Secret blog in the early 2000s.

Whether Apple will succeed in proving willful and malicious conduct remains to be seen, but the tech giant’s aggressive legal strategy is clear: deter leaks by making high-profile examples of those who cross the line.

Tags:

Haridas Gowra Avatar

Help Us Grow

If you like this post, please share it with your friends.

You are free to copy and redistribute this article in any medium or format, as long as you keep the links in the article or provide a link back to this page.

Subscribe to Newsletter




Privacy Settings

Privacy & Cookie Overview

Our website uses cookies to provide you with the best user experience possible. These cookies are stored in your browser and perform essential functions such as recognizing you when you return to our website, as well as helping us to understand which sections of the website you find most useful and engaging.

To learn more, you can read our Privacy & Cookie Policy or reach out through our Contact form.

Strictly Necessary Cookies

Strictly Necessary Cookies must always be enabled to ensure the proper functioning of this website and to allow us to provide you with excellent service. These cookies are also essential for saving your cookie preferences.

Google Adsense

We use Google AdSense to keep this site free by displaying relevant ads. AdSense requires essential cookies that cannot be disabled, but you can manage other cookies. We respect your privacy and provide options to control non-essential cookies.

For more details on how Google handles your data, visit Google's Data Usage Policy. Please review our Privacy Policy for more information on how we protect your data.

AddToAny

We use AddToAny for social sharing. It doesn’t store cookies, ensuring a privacy-friendly experience. AddToAny complies with GDPR and CCPA by default.

For more, see their Privacy Policy.

OneSignal

We use OneSignal to send notifications to users who opt in. OneSignal complies with GDPR and is certified under the EU-US and Swiss-US Privacy Shield frameworks.

For more, see their Privacy Policy.

3rd Party Cookies

This website utilizes third-party cookies, which can enhance your experience and support our ongoing efforts to improve our services.

Google Analytics

We use Google Analytics to collect anonymous data, such as visitor numbers and popular pages, to improve user experience and site performance. Keeping this cookie enabled helps us refine the site based on visitor activity.

For more information, see Google’s Privacy Policy.

Discover more from Prime Inspiration

Subscribe now to keep reading and get access to the full archive.

Continue reading