There is a passcode to use the phone, and I think also a possible passcode to protect secured information. The problem is that about ten failed access attempts deletes the secured information. Intended to be failsafe secure.
I'm still puzzled why the FBI cannot practice with a hardware debugger on a duplicate phone, and when they get it figured out, then it seems like one simple breakpoint in the correct phone should do it. Obviously there must be more I don't understand. But Apple could do it much faster.
I'm still puzzled why the FBI cannot practice with a hardware debugger on a duplicate phone, and when they get it figured out, then it seems like one simple breakpoint in the correct phone should do it. Obviously there must be more I don't understand. But Apple could do it much faster.