2 years ago, 2 of my friend's Pixel 6a devices were kept for forensic data extraction and last week he got notice from his legal notice that they succeeded accessing both devices, extracting the encrypted data and gained access to thousands of messages and files.
The first phone had a 5 digit PIN, of this I am sure. But he claims the second phone had an 8 character alphanumeric password. Both were randomly generated.
This suggests they bypassed the TPM/Tensor chip to brute force the devices.
I don't know the software version the devices were on and if they were BFU of AFU but I am 100% sure that the bootloader was locked, OEM unlocking was disabled and there were no options like USB debugging activated.
I would to ask if there is more information available on how this is possible, discuss about forensic extraction and possible points of failure for academic purposes as I know you don't condone use for anything illegal.