The FBI has been unable to access a Washington Post reporter’s seized iPhone because it was in Lockdown Mode, a sometimes overlooked feature that makes iPhones broadly more secure, according to recently filed court records.
The court record shows what devices and data the FBI was able to ultimately access, and which devices it could not, after raiding the home of the reporter, Hannah Natanson, in January as part of an investigation into leaks of classified information. It also provides rare insight into the apparent effectiveness of Lockdown Mode, or at least how effective it might be before the FBI may try other techniques to access the device.
“Because the iPhone was in Lockdown mode, CART could not extract that device,” the court record reads, referring to the FBI’s Computer Analysis Response Team, a unit focused on performing forensic analyses of seized devices. The document is written by the government, and is opposing the return of Natanson’s devices.
Archive: http://archive.today/gfTg9



The FBI just wants the public to think their phone is secure. I got news for you, it’s not secure. Look up Snowden.
Reminder that none of your data is safe on a cloud. Law enforcement can get a judge to sign off and make Google/Apple decrypt your cloud data and give it to them.
If you really want your data private you have to put it on an encrypted hard drive. Recommend Veracrypt.
Or Luks which is well integrated with Linux. Are there significant advantages with Veracrypt?
and even then, unless you unlock it for law enforcements upon request. you will serve lifetime in imprisonment or until you agree to unlock it and whatever if any crime is within the locker to continue imprisonment. so safeguarding data really doesn’t matter in the end anyway because any sensitive data kept anywhere will be used against you either by the law or by criminals. which often times seems to be one and the same.