- Edited
You're posting a lot of highly inaccurate speculation and claims. Not clear why you think devices don't have data extracted. Cellebrite has been around offering this for years and their tools are widely used around the world by governments, not only for law enforcement. There are several other forensic data extraction companies with widely used tools, mainly MSAB (XRY) and Magnet Forensics (Graykey). The tools are widely available and widely used. They are not only used in special circumstances but rather as standard operating procedure around the world. It's also not limited to law enforcement. These are not the only type of widely used commercial exploit tools, but remote exploit tools are much more rarely used and not generally going to be widely distributed / accessible to low-level cops, border guards, etc.
I ask also, because i heared a few times, that the police is not able to access an iphone 6 with an 8digit passcode.
This is generally the case with an iPhone 12 or later / Pixel 6 or later if the device is turned off. That's shown by the Cellebrite Premium documentation we posted here and is still the case in the January 2025 Cellebrite Premium documentation. If the device isn't in the Before First Unlock state, they can get all the data with Cellebrite Premium for either an iPhone or Pixel regardless of the lock method unless it's a Pixel running GrapheneOS. We have an 18 hour locked device auto-reboot timer by default and Apple recently added a 72 hour timer in October 2024 for iOS 18.1 likely at least indirectly inspired by our feature since several of them followed us on Twitter (may not be active there anymore) and the idea was propagated around everywhere after we shipped it in June 2021.