No change of heart, Okie, Apple always assists when it can, but not when ordered to destroy the security of all iPhones. This iPhone likely had not had its AppleID changed. That means there are ways to reset that Apple can use to get a limited amount of data from it, but not get to the encrypted data. Also Apple may know ways they COULD use the dead mans fingers that others dont know. . . but not after 48 hours (sometimes less). ,p> Also, Apple CAN provide them anything hes backed up to iCloud if the give them a proper search warrant. . . and some dummies write their passcode on notes or stickies which might get backed up to iCloud. Most people dont opt to use the iCloud encryption using their passcode. . . So, its likely all there. I posted Apples legal law Enforcement guidelines PDF link day before yesterday which outlines what they can and cant do. Here it is again:
Apples Legal Process GuidelinesGovernment & Law Enforcement within the United States
6 posted on
11/09/2017 4:07:46 AM PST by
Swordmaker
(My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
That is simply not the case. Fron CNBC of all places.
https://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html
The judge asked Apple to provide "reasonable technical assistance" to the U.S. authorities, which would require the technology giant to overhaul the system that disables the phone after 10 unsuccessful password attempts. Once this feature kicks in, all the data on the phone is inaccessible. Apple declined to help the FBI.
At the time, Apple chief executive Tim Cook called the order "chilling" and said that it would require writing new software that would be "a master key, capable of opening hundreds of millions of locks". Cook's argument was that if the FBI could access this iPhone, nothing would stop them from doing it to many others.