- Edited
Alllus Their give them access to essentially all of the data on the device for devices in the After First Unlock state which is the typical situation.
They cannot bypass password protection even on the Samsung S20
They can bypass passwords with brute force since people usually don't set strong random passphrases. Samsung devices do not successfully block brute force like modern iPhones and Pixels are doing successfully with their secure elements.
All attempts to prevent access to the USB port are attempts to prevent reading the file system image
No, that's not what they're doing. They're exploiting the device to gain control over it and access everything the OS can access, which is essentially everything on the device in After First Unlock state.
A good password, updating the system and rebooting the phone for a few hours - completely makes the phone invulnerable on any version of the latest OS.
Rebooting most Android devices doesn't clear the memory. People also often don't get a chance to reboot or power down in these situations even if they know that's a good idea.
Our locked device auto-reboot feature automatically returns the device to the Before First Unlock state in combination with other features for zeroing memory, etc. Before that, the device still needs to defend itself from being exploited.
Aside from that, a password is hardly immune to brute force unless you use something like 6+ random diceware words or 18+ random letters/digits.