No back door? Do you know each of the encryption methods being used on the perps phones?
Have you ever received advertisements related to your recent conversations?
I do. There are two phones, both iPhones, both of which have Apples built-in the hardware, state-of-the-art, 256bit Advanced Encryption Standard (AES) Encryption applied to all data on the devices. And yes, there is no back door, not the way iOS devices are designed.
Only the user knows the unlocking passcode which starts the rebuilding of the actual 256bit AES encryption key. That passcode is not even stored on the device it unlocks. Instead, when the user enters his passcode, a secretly stored, unknown randomly selected at manufacture algorithm takes that entered passcode and creates a one-way hash, compares the result to a hash that was stored in the devices Secure Enclave when the user first created his passcode. If they match, the iOS device is unlocked and the Encryption Engine using another randomly selected algorithm then uses the stored hash and four other stored pieces of data (one of which was randomly created when the hash was first created using environmental factors) to re-construct the actual unknowable 256bit AES encryption key, which is never, ever stored on the device, or sent outside the Encryption Engine processor inside the Secure Enclave which itself exists inside the Apple A12 or A13 Bionic SoC IC Processor.
Without that user passcode being accurately entered, and you only get a maximum of ten attempts to get it right, with increasing wait timeouts after the first three, the iPhone is either bricked, or the data is permanently erased, depending on what the user decided should happen when someone tried to break into his device.
Have you ever received advertisements related to your recent conversations?
Creepy isnt it?
All iPhones have been data encrypted from the factory...and the newer ones use a "secure enclave" chip (since iPhone 5s). Once you set your sign in code/password even Apple can't get in without it (longer is better...4 digits could be brute forced if ""X" attempts then erase" isn't set-up on the phone). Apple gave the FBI the iCloud data for the Pensacola shooters' iPhone (Apple holds those encryption keys), but the actual phone has no backdoor.
https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf