For people who don't want to scroll through the unrelated comments there: NAND mirroring has non-zero risk of being a destructive technique due to memory damage. This potentially disqualified it from use for the FBI's purposes, explaining the purchase of another tool.
But the question is, did the FBI read that image and seek a court order anyway?
The FBI is slow, but not incompetent by any means. This was a terrorist's cell phone, a crucial link to determining whether this was a lone act or a coordinated plan.
Even if they couldn't introduce it in court, wouldn't they do it anyway? In fact, it seems very suspicious that the FBI suddenly found an exploit vendor after Apple refused to bow to governmental pressure.
So the question is becomes, "If they had the data anyway, why seek a court order?"
To examine the problem, consider that to the FBI, accessing a single phone is a win in a single battle. That is not what the FBI is after.
What they are after is total victory. They believe only an ironclad legal precedent can win their war. They may be right. They may be wrong. I strong suspect that they are wrong.
Encryption is like the tide. It can be pushed back, but in the end it will win.
Yes they were after a precedent because regardless of how "easy" this is it's not a turnkey solution and it doesn't scale well.
The FBI were looking for an easy solution that every law enforcement can use and that is to force Apple and other device makers to unlock the devices or undermine their security sufficiently for traditional mobile forensic approaches to be viable.
The FBI didn't find an exploit they found a vendor with an exploit, likely a vendor with an exploit that did not involve doing irreversible damage to a phone to extract the data from it.
Forensics and even digital forensics have pretty strict rules to what counts for a forensically secure data extraction and what doesn't.
When in doubt you simply wait for a better method to come around, you preserve evidence this is why we can go back and reexamine evidence with new techniques, the first question of any new forensic process is "does it alter the state of the evidence".
Press again fails to understand the topic, how this applies only to 5c and how phone vendors (Apple) defeat this with safe hardware data storage and keys (see previous HN discussion).
In theory it's probably possible to modify this to work on newer iPhones, it's just that no-one's done the work yet. The Secure Enclave has no onboard flash memory and its anti-replay protection seems to be entirely reliant on an external Flash chip that can itself be removed and its contents replayed. The BBC are right, assuming what's publicly known about the Secure Enclave is correct.
Well, you're making a claim for which contrary evidence exists in the form of the very article you're commenting on. Do you have any evidence to back what you're saying?
Every time Apple iterates on a phone they move the security forward. The biggest leap was with the 6 and the introduction of the secure enclave. And they are getting better still.