Where am I misinformed?The only problem is your misinformation.
My understanding of how crypography works? How the time of activation of the iPhone is probably used as a counter-key to a personal key of the user to create an extremely strong cipher, and how the iPhone wipes contents after 10 tries to prevent a brute force attempt?
Or is it my understanding of the issues surrounding chain of evidence?
Or is it the information I learned from touring an FBI computer forensics lab where a friend of my did this for a living and how he explained the process?
You essentially just said, "You're wrong" and stormed off.