de0u I've been searchin about BlackBerry Forensics during several years through dedicated forensics forum and academic or expert paper. I have never found a claim of a forensic company or an examiner who was able to brute force a BlackBerry and escape the 10 attempts.
I have tried UFED4PC and cellebrite doesn't look to be able to do anything if device is locked. I don't expect cellebrite premium or XRY pro to be able to brute forcr the phone. They can't even go beyond a logical extraction to get deleted data. They also can't get beyond a logical extraction on windows phone but JTAG create a full dump of memory and make possible for the examiner to retrieve deleted stuff and bypass screen lock. It looks like only corporate used encryption on Nokia windows phone devices.
On blackberries encryption is never enforced. You have to manually activate it through settings. Chip-off is then useless and the examiner must enter the correct password to access the data.
Data is gone forever if failed after 10 attempts because the user memory is automatically rewrite with zeroes.
Such a shame that they had to retire themselves from mobile market but that's another story.
Google will not implement this feature. I don't expect them to do it.
With all the billions they have, they could hire a dedicated team to create feature such a 2FA fingerprint unlock but they didn't. GrapheneOS did it while they have just enough ressources to pay devs and things like infrastructure thanks to the generosity of people who have faith in this project and donate.
During more than 2 years pixel's stock os was vulnerable in fastboot mode and Google did nothing to stop it. It's impossible that they did not know about it. If it did not become public, they would not do anything. For me, it's unforgivable from a company like Google.
I don't understand how they think and work. They created brilliant hardware for pixels but really sucks on a lot of things when related to the software of stock OS.