Secondo Ars Technica ,
Jonathan Zdziarski, a leading independent Apple iOS security researcher and forensics expert, has a theory about the FBI's newly discovered potential route into the iPhone 5C used by San Bernardino shooter Syed Farook. In a blog post, Zdziarski wrote that the technique the FBI is planning to use to get around having to compel Apple to help bypass the phone's security is likely a method called NAND mirroring—a hardware-based approach that, while effective, is far from the "golden key" software the FBI had sought.
Questo è stato ripetuto in un certo numero di altre notizie.
Da come sembra, non sarà diverso da cosa @ user9806 ha postulato un mese fa .
Tuttavia, come note @Xander:
Yes, it is possible. However, that runs the risk of destroying the device without getting the data off first, which is undesirable.
Il che mi porta a chiedermi quali sono i processi coinvolti in questa tecnica? Che cosa implica esattamente il "mirroring NAND" che impedisce che il chip venga distrutto?