I regret to inform you that the latest leaked Cellebrite support matrix [1] (from summer 2024) showed that all iOS devices on then-current iOS versions could be forcibly unlocked by law enforcement in AFU state (After First Unlock, following a reboot) using their software.
The only devices that successfully resisted their attempts were Google Pixels running GrapheneOS. According to those documents Cellebrite hasn't had the ability to crack them open since 2022. There's an updated matrix for Android from February [2] which indicates that this hasn't changed on the Android side.
We don't know what Apple does or doesn't do. They might not be able to unlock iPhones in their normal state, but what stops Apple from instructing your device to silently install a specially crafted update which makes that possible, prior to your arrest? I don't think that there is anything stopping them.
You also said "[...] and added additional controls to make brute forcing infeasible." which isn't true as demonstrated by Cellebrite's capabilities. They can take the latest iPhone running the latest iOS and unlock it for you for a price (allegedly only with a warrant which law enforcement can always get).
> If that wasn't true, literally all iPhones would be backdoored by the Russians and Chinese lol.
This comparison also doesn't hold up because "Russians and Chinese" don't have physical access to our devices (seemingly required for most of these exploits) while law enforcement who arrested you does, and they can easily ship your device to Cellebrite's lab if need be.
The only devices that successfully resisted their attempts were Google Pixels running GrapheneOS. According to those documents Cellebrite hasn't had the ability to crack them open since 2022. There's an updated matrix for Android from February [2] which indicates that this hasn't changed on the Android side.
[1] https://discuss.grapheneos.org/d/14344-cellebrite-premium-ju...
[2] https://osservatorionessuno.org/blog/2025/03/a-deep-dive-int...