I would like to know the technical limitation law enforcement is facing when trying to decrypt data in iOS 8.
I assume the data is encrypted using a key derived from the user's passcode, and that that key is purged from device memory after an idle period. Brute force attempts to guess the passcode are throttled, and too many attempts cause the device to delete the encrypted data.
Can someone confirm I'm on track so far?
Then, law enforcement would be limited to trying to circumvent the passcode entering throttling logic on the device, which Apple has physically engineered to be a destructive operation, thus it's outside the capabilities of even the most sophisticated technology labs in the US government?
I assume the data is encrypted using a key derived from the user's passcode, and that that key is purged from device memory after an idle period. Brute force attempts to guess the passcode are throttled, and too many attempts cause the device to delete the encrypted data.
Can someone confirm I'm on track so far?
Then, law enforcement would be limited to trying to circumvent the passcode entering throttling logic on the device, which Apple has physically engineered to be a destructive operation, thus it's outside the capabilities of even the most sophisticated technology labs in the US government?
Am I still on track?