they presumably had a software emulator or VM or something when they were developing and testing this stuff.
I don't think Apple said to their coders: "Here's a gross of iPhones. Don't make too many mistakes when you're coding and testing the encryption stuff - these things don't grow on trees...."
;-)
I dunno.
But it makes no sense to me that they've developed something that can't be simulated or bypassed. IOW, I wouldn't be surprised if there was provision for a "software simulation of the hardware key" during development and that that conceivably could be added back under subpoena.
I'm just speculating though. I have no inside information.
Cheers,
Scott.
I don't think Apple said to their coders: "Here's a gross of iPhones. Don't make too many mistakes when you're coding and testing the encryption stuff - these things don't grow on trees...."
;-)
I dunno.
But it makes no sense to me that they've developed something that can't be simulated or bypassed. IOW, I wouldn't be surprised if there was provision for a "software simulation of the hardware key" during development and that that conceivably could be added back under subpoena.
I'm just speculating though. I have no inside information.
Cheers,
Scott.