02-18-2016, 02:43 PM
(02-18-2016, 02:33 PM)bfine32 Wrote: I guess my confusion was that they were trying to see who they (she) were communicating with, that's why I said someone should be able to decrypt. I can see the differences if they are just looking for data stored on a device. I still think Apple has the tools required, but that's just an ignorant assumption.
Secondly, thanks to all about the lesson(s); I truly learned something today. Chalk that up to one more thing I am now an expert on. I think I am down now to only 2 or 3 things.
If all they wanted was who they communicated with they wouldn't need the phone at all. They are after information that never passed through a server, therefor there is no other record of. Things like pictures notes possibly calendar appointments if the phone wasn't syn'd to a cloud server maybe contacts they have in phone but called or contacted some other way. This is more about finding out about them it seems over who they contacted.