If you do this for a living then you should know what you're talking about but this is absolutely not true. The first-hop connection to the access point is only one part at the very beginning of a very long chain of components.
This issue is indeed a big issue as it effectively renders https and any other ssl-based connection useless.
SSL provides end to end security and validation. With this "bug" this protection and validation is lost. While public wifi is a primary concern it is by far not the only concern.
Many other vulnerabilities and points of attack would otherwise be mitigated by SSL. Those issues become much more important now since these are the cases that SSL is meant to help protect against. Everything between you and the site you are communicating with becomes a potential point of exploit with this bug.
Note the risk here is primarily one of theft, though well-crafted malicious actions could go further. There is a significant financial benefit for criminals to attempt to leverage this vulnerability quickly, and when successful the victim likely would not notice until it is too late.
I'm aware, nothing you just posted couldn't have been found on any tech site. This bug has been present for a long time, dating back to iOS 6, so being all up in arms about it is pointless.
Also, SSL keys are breakable.
But that's not what this thread is about, at all. This isn't to discuss the content of the update, or why you should update.
I never stated NOT to update, it's an important update. I was making people aware of the issue, so they could be prepared in the worst case, ie the update bricks their device.
You can stop trying to educate me on SSL/OpenTransport and MitM attacks.
Sent from my iPhone using Tapatalk