I've been using an iPhone since OS 1.1.2. The iOS 1-6 days did not have anywhere near the kind of nonsense we have had in the last two years. In addition to the Error 53 and Error 56 problems we've had recently [...]
The major difference is that these updates must interact properly with the anti-tamper features on the secure enclave. These errors happen when the security handshakes effectively fail and the secure enclave ends up treating the update as malware. Of course the details usually differ, but the underlying issues are all related.
It is probably best for us, the users, that the secure enclave errs on the safe side and bricks the device, rather than behaving in a way that would allow someone else to own our device.
The modern iOS upgrade process is way more complex than the upgrade process on prior generations of hardware.
[doublepost=1463666259][/doublepost]
Reinstalls started with Mac OS Lion, which has been called "The Vista of OS X," and have continued ever since.
I don't know if I'm just using my hardware improperly, but we have two '09 MacBook Pros, '13 iMac, had an '08 iMac and '09 MacBook, also have a '15 iMac and a year old hackintosh, all of this currently runs Yosemite, and I've never had to reinstall anything. I have *chosen* to do a couple of major OS X version updates as reinstalls, but this was never in response to any sort of an issue. Just so that I don't appear unrealistic, I must state that OS X versions past Mountain Lion perform much worse than expected on mechanical hard drives. OTOH, the now 7 year old Apple hardware we still use works great if you use a decent SSD. The only device on a mechanical drive is the '13 iMac, and I'll be upgrading that to a 1TB SSD soonish, it'll work way better then.
[doublepost=1463666698][/doublepost]
[doublepost=1463626682][/doublepost]They said that the bricked one will be melted down - weird why would you melt down something that has a software update issue?
The update has failed most likely because the secure enclave is treating your device as tampered with. IOW, due to a bug in the updated OS X and/or the update process itself, the device is in a state where the secure enclave has dropped the encryption keys to the iOS volume and to parts of the secure enclave firmware and permanently disabled access to the device. The secure enclave is a tamper-proof piece of hardware that's not treated as a replaceable part, so the entire device is a paperweight at this point.
It should be pointed out that although this is a bug, it's a reassuring one. The security system has acted as designed, protecting you from potentially malicious tampering. Sure, you didn't really attempt to tamper with the device, but it'd be worse if the design would permit changes it was "unsure" about. The only safe thing to do in such a case was exactly what happened: a bricked device. That's exactly what should be happening when someone attempts to tamper with your device, e.g. if law enforcement tried to sniff around your device without your permission, etc.
Sure it's kind of a fail when genuine Apple update is treated as malware, but hey, you got a hardware refresh out of it

Having tried to get a bunch of MS Surface 3s replaced under warranty was a much more drawn-out process, if you care for my own anecdote.