Let me start this out by stating that we, in no way, can confirm any particular reasoning, whether it be beneficial or malicious, as to the CIA's attacks on Apple's devices and software. That being said, if you own any type of Apple device that has come out since the release of the first iPhone, there are some recent developments that you should definitely be aware of.
While we don't know everything for sure, we do know that the CIA and the NSA have been making attempts to hack into Apple's security networks. This has come as a shock to just about every consumer that has found out about it. Of course when asked about it, the CIA had no comment on the story.
Xcode is the development code used to design applications on both iOS and OS X devices. The "dummy" code would allow access to all of the applications utilizing a backdoor implanted within the code itself. This particular "whacked" code would be targeted at budding developers who might be unfamiliar with the original, unaltered Xcode. Should these newer developers end up using the tampered Xcode, they would be allowing a backdoor to be created within the program, unknowingly of course. Needless to say, this type of tampering and targeting towards newer developers is violating more than a few laws.
What type of data was the CIA even planning to take from us? Well apparently they've been looking to ascertain the GID keys used by our devices. A GID key would be used to track a single user on one device. The GID key, however, would be used to gain access to an entire product line as they likely use the same application processor. If the CIA were to get their hands on these GID keys, they'd be able to create their own type of firmware to install on an entire product line that shares the same app processor, thus allowing for mass surveillance.
Again, there is no confirmation as to the reasoning that the CIA has for these malicious attacks on Apple's product security. That being said, this is disturbing to say the least.
Feel free to share your thoughts in the comments below.