for Ars Technica , the report that was done by Dan Goodin was cited as Gal Benjamin’s research which had detailed information on the issues that were inherited with the Full Disk Encryption of Android and stated either hardware changes may be needed and the fix was not simple. The iOS Security Guide of Apple detailed the fact that there are encryption keys and a unique ID that is stored on iOS devices which is located in the specialized coprocessor called the Secure Enclave, this was developed internally as Apple A7’s part and later on as Application Processor.
It was on this basis that it had been stated by the company that on mobile device security, the iOS is said to be a major leap. Even the system cannot read the data that is being stored on the Secure Enclave. If any kind of information is needed from the Secure Enclave, only simple requests can be made due to the fact that a separate process is used for running iOS. A strong protection barrier is created due to this mechanism which is not just for the Full Disk Encryption, but even for Apple Pay, Touch ID and various other iOS features that are security related.
The recent conflict between the FBI and Apple in regards to the device encryption was in an older A6 model which was on the iPhone 5c. Even though this lacked the Touch ID and Secure Enclave, however with third party expert help, the device encryption breaking was not possible.
Since the iPhone 5s of 2013, the iPhone models that were sold was enforced with Full Disk encryption and due to that, the Secure Enclave was also used. Even for user authentication with the help of fingerprints, it was done without any kind of encryption key or biometric data made in order to access the apps or iOS.