mheslep said:
Where's the credible information indicating that every Apple phone on the planet would be opened up...
There are several answers to that. One from TheVerge:
http://www.theverge.com/2016/2/19/11064054/apple-fbi-lockscreen-encryption-passcode-backdoor
"while the precise software proposed by the FBI can’t be used to unlock other phones, it can still be useful to thieves. If the code fell into the wrong hands, it could potentially be reverse-engineered into a generic version, removing the code that ties the attack to a specific phone. That reverse-engineered version would still need Apple’s signature before it could be installed — something thieves are not likely to have — but that signature system would be the only thing protecting a stolen iPhone and the information inside it."
What Apple said is every iPhone -- even new ones with Secure Enclave -- would be vulnerable to FBI-mandated operating system. It is now well documented the government wants to use this on many iPhones. It's not a case of designing this once, using it once, then destroying it. The use would proliferate, which means risk of interception and nefarious deployment of that hack by various actors.
To try and prevent this, it appear Apple would have to construct a Secure Compartmentalized Information Facility (SCIF), which are about $50 million:
http://money.cnn.com/2016/02/26/technology/apple-iphone-fbi-hack-cost/ However if the method is widely deployed as the government plans, it would possibly require multiple geographically-dispersed SCIFs.
Wouldn't the hack even if intercepted still require Apple's authentication signature to use? Another comment from the above Verge article: 'Forensics expert Robert Lee says he’s worried the volume of requests could lead agents to seek a signed, generic version of the software, which would bypass all lock screen protections if it fell into the wrong hands. "The FBI’s going to come back again and again, and finally they’re going to ask for a version of this that’s generic," says Lee. "And it’s that generic version that’s really dangerous."'
There was a good description of the actual "hacking" method in ArsTechnica:
http://arstechnica.com/security/201...a-golden-key-backdoor-its-called-auto-update/
"When Apple says the FBI is trying to "force us to build a backdoor into our products," what they are really saying is that the FBI is trying to force them to use a backdoor which already exists in their products. (The fact that the FBI is also asking them to write new software is not as relevant, because they could pay somebody else to do that. The thing that Apple can provide which nobody else can is the signature.)"
The only technical element which makes this possible is the iPhone's ability to accept a new software update without a password, given Apple's signature. Since the government has now forced this issue, Apple may feel impelled to revise that protocol so no software updates are possible without a user-entered password, which would itself protected by Secure Enclave hardware encryption. That would eliminate any possibility of accessing iPhone content, except by using "chip decapping" and focused ion beam methods.
Chip decapping is commonly done for reverse engineering and competitive analysis:
https://www.chipworks.com/competitive-technical-intelligence/overview/custom-analysis
Electron microscope examination of Apple A6 CPU by Chipworks: http://appleinsider.com/articles/12/09/25/teardown-of-apples-a6-processor-finds-1gb-ram-2-cpu-3-gpu-cores