Apple doesn't provide customized iOS distributions to schools and institutions and carriers. It's the same iOS distribution, with certain features potentially disabled or enabled from Apple servers, or from locally-installed profiles used by schools and institutions and a few individuals, or from carrier-provided profiles. o
u'll routinely see chatter for features you don't have enabled.
You'll also see myriad ominously- and scarily-worded and utterly benign messages in the logs, too. Log chatter is undocumented, and subject to change, too.
I've yet to see any of these screen shot postings show anything.
Logs and log chatter comprise infinite haystacks, with unknown numbers and quite commonly no needles to be found, and no certainty what the needles will even look like.
Interested in the internals? Get the three volumes of the new OS X Book, and have a look. The volumes of that book covers macOS, iOS, and iPadOS.
Interested in your own security and privacy? Personal Safety User Guide - Apple Support (there's a PDF there, too.)
PS: iOS and iPadOS are not completely immune to problems; there can be and have been exploits. All available evidence indicates the exploits are exceedingly expensive—full-stack exploits are worth a million or variously more USD$—and their usage very much targeted. If you're a person of interest to somebody exceedingly rich—political dissident, senior in politics or some large organization, with access to sensitive or classified or national defense data, investigative journalist, or with access to great wealth yourself, or similar, these risk calculations shift. For most reading here, the risk of encountering these exploit tools is very low.