The apple phone I believe is encrypted with a block AES-256 bit hardware S-box. Given the repeating opcodes and and addressing modes and other structures within a computers memory It shouldn't be to difficult if one has physical access to the phone ( or ssh wink wink nod nod say no more say no more ). A simple search will show that current research believes that AES-256 is less secure than AES-128.
Friends make arrangements for one time pads!
When I was in grad school and we had to give a monthly presentation of our work, when we didn't fully know and/or understand what we were talking about we called it our monthly stand-up, turn around and speak out your arse session. The profs just liked a good laugh!
Truth to me is that this event is indistinguishable from propaganda and we may know the truth in 20 to thirty years. Some of use may know sooner than others ;)
That's totally bogus. Reading the search results you find they all debunk that claim. The researchers point out that Grover's Algorithm applied to AES 256 would result in two AES 128 encryptions but that the hardware to do that simply doesn't exist and it's doubtful it ever will, while the Quantum hardware to apply it to AES 128 to convert it to two AES 64s does. The other point is the are talking about COMMUNICATIONS AES and linear encryption. The following is from a cryptographer forum of just a few months ago:
It shows there exists an attack that works on a weakened version of AES-192 and AES-256.The best attack on AES-256 is still brute force.
Maybe someday there will be an attack faster than brute force on AES-256 (all 14 rounds), but that hasn't been shown yet.
and they are still not discussing elliptical encryption techniques.
The reason that AES 128 is still used for communications in banking, financial, and even government uses is that it's still good enough and it's fast. AES 256 handshaking takes too damn long.
Friends make arrangements for one time pads!
Communications. . . again.