⚠ iOS EXTRACTION PREREQUISITES
Secure Enclave
All iPhones since 5s have a Secure Enclave (SEP) — a dedicated coprocessor that holds encryption keys. Keys never leave the SEP. A physical NAND dump alone cannot decrypt user data without SEP cooperation. No known bypass on modern hardware.
BFU vs AFU
Before First Unlock: Keychain locked, most databases encrypted, location/health data inaccessible. After First Unlock: Data class A/B accessible. Know your device state before choosing method. Inactivity Reboot (iOS 18.1+) returns to BFU after ~72hrs.
USB Restricted Mode
iOS 11.4.1+: after 1hr locked, USB accessories blocked. Does NOT stop checkm8 (bootrom). Does block Cellebrite/GrayKey USB-based methods on A12+ hardware. Plug test: if "Unlock iPhone to use accessories" appears = restricted.
Pairing Records
If device was previously paired with a trusted computer, a .plist pairing record exists. With this record + device in AFU state, advanced logical extraction is possible without passcode. Check investigator's/subject's computers.
Lockdown Mode
iOS 16+: USB never enumerates at all. No accessories prompt — device simply does nothing. No config profiles installable. Severely limits all USB-based methods including advanced logical.