No it means there are clever ways of brute forcing. Grayshift can still break any iOS up to 12.
If this raghead islime was using iCloud, then Cellebrite can probably break into it.
Mentioned previously, the House of Saud only sends either royals or top 'businessmen' sons to aviation school. Note that the AP said the Saudi's even paid for iSlimes gun training, which he picked up in an Air Force military sales training course.
No, there are caveats on both GreyKeys, and Cellebrites brute force iOS system. First of all, neither of them can touch an iPhone with an up-to-date iOS installed. That means any iPhone that can accept iOS 13 or higher is invulnerable to both systems, but you did mention "break up to 12".
One piece of good news there is 55% of iPhone users worldwide are on iOS 13 or higher. In the US its about 75%. So, if your iPhone can use iOS 13, upgrade.
The other caveat is that both GreyKey and Cellebrite are still brute force systems that must use the devices own system. They have just found a vulnerability that lets them turn off the time-out delays and eventual bricking or erasure of the devices. They can keep trying passcode as long as they want. . . or as long as the prosecution is willing to tie up one of the machines. This is crucial if you want your data private.
For either of these unlocking systems, the average time to unlock an iOS device that has a four digit passcode is around two hours. Sometimes they get it right away, because theyre programmed to try obvious patterns people use, four corners, a cross, specific number patterns, etc. However, four digits can only have 10,000 combinations, so youd think a computer could whip through that in no time. It could, but Apple has thrown a skunk into Cellebrite and GreyKeys party. Apple wont let it try keys at a computers speed. This is a human interface and runs at people speed! Apple built in a 1.3 second delay between trying passcodes. Too bad, so sad, Cellebrite and GreyKey.
What does this mean for us poor privacy loving Apple owning Freepers? First of all, if either of these two systems had to go all the way from 0000 to 9999 to find the passcode in a four digit passcode with a 1.3 second delay, it would take them a little over 3 ½ hours to test all ten thousand possible passcodes. Great, you say, thats not a big deal. Nope, its not.
But what if you went up to six digits, or one million possible passcodes? Thats 100 times longer to try every possible one, or ~350 hours! Thats 14 ½ days, 24 hours a day. . . Getting interesting?
Perhaps a seven digit passcode might be of better use. . . 10,000,000 passcodes. ~3500 hours, 146 days, 24 hours per day. . .
Hmmmmm, dare we go for 8 digits, 100,000,000 passcodes, ~35,000 hours, almost 4 years, 24 hours per day. Good thing Apple makes good devices that last.
Keep in mind we are just using ten numeric digits for our passcodes. What would happen if we turned on complex passcodes and added alphabetical characters to the passcodes?
Lets just go back to six character, easy to remember. Now we are working with 26 lowercase and 26 uppercase and 10 numbers. . . 62 characters. Where before we had only 106 = 1,000,000 possible passcodes, now we have 626 = 56,800,235,584 possible passcodes. 56.8 billion possible passcodes with just six characters. . . And testing at one every 1.3 seconds. That means it would take Cellebrite or GreyKey only 2,147 years to try every possible passcode.
How about an eight character passcode? 628 = 218,340,105,584,896 possible passcodes. 218.3 trillion possible passcodes! Only a mere increase to 9,000,575 years to try every possible passcode at one every 1.3 seconds!
If we toss in a few symbols to our Alphanumeric mix, the number of possible passcodes and time to break goes astronomical. Apple allows 223 characters to be input from the iPhone keyboard and your passcode can be a totally absurd 256 characters. Insane, I know. . . but that would give you a possible 223256 passcodes to drive Cellebrite and GreyKey out of business.