But in this case, it's protected by only a 4 digit PIN, which means there is no real protection against brute force once the 10 guess limit and time delays are removed. What happens next time when a bad guy uses a 15+ digit passphrase and the FBI can't brute force it? They will immediately demand that the encryption itself be backdoored, and we're back to the Clipper Chip debacle of the 90's. This is something they have already demanded.
2011: FBI Director Robert Mueller vists Silicon Valley campaigning for backdoors --
https://www.schneier.com/blog/archives/2011/10/fbi-sponsored_b.html
September 2014: Justice Department has a conniption over Apple's and Google's new encryption schemes in iOS and Android --
https://www.techdirt.com/articles/2...-decision-to-encrypt-phone-info-default.shtml
September 2014: FBI Director James Comey says the FBI has had contact with Apple and Google about encryption. As a bonus, John Escalante, chief of detectives for the Chicago PD, says the iPhone will be the phone of choice for pedophiles --
https://www.washingtonpost.com/news.../09/26/the-phone-of-choice-for-the-pedophile/
October 2014: FBI Director James Comey speaks at the Brookings Institution hinting that "the administration might seek regulations and laws forcing companies to create a way for the government to unlock the photos, emails and contacts stored on the phone" --
http://www.nytimes.com/2014/10/17/u...-devices-hindrance-to-crime-solving.html?_r=0
October 2014: For the first time in over a decade since the crypto export regulations were revised, a company was fined, fundamentally changing how the rule is enforced --
https://www.bis.doc.gov/index.php/a...0-penalty-for-unauthorized-encryption-exports
related to the above:
http://www.goodwinprocter.com/Publi...on-Exports-May-Be-Treated-More-Seriously.aspx
This is just a small piece of the larger context in which we must place the FBI's comments. The San Bernardino attack is only a pretext. I will post some more links when I get the chance.