The documents provide never-been-seen insight into the current cat-and-mouse game between forensics companies and phone manufacturers Apple and Google.
Lol, did you see what windows computers do? They literally upload your key to microsoft. Like they aren't event hiding the fact.
If you don't create a microsoft account to allow for the upload, then they just store the key unencrypted and its effectively like no encryption.
Has there been any information about how long physical access is needed for these attack methods to extract data?
I've got my auto restart set at 8 hours, in graphene's mastodon thread, they say 10 minutes is best for highest levels of security. The short time frame given in that thread makes me wonder if these exploits give instant access to data.