Apple has already fallen afoul of law enforcement because its hard stance on encryption and protecting users' privacy, no matter who that user may be. This testing showcased that data transfers are blocked after seven days without unlocking a device. Perhaps it will be, should the feature make it out of the beta stage and into the stable version of iOS.
New 'Black Dot Of Death' Text Bug For iOS Messages Discovered
Afonin also notes that plugging the device into a computer after USB Restricted Mode has been enabled won't bring up the usual "Trust this computer" prompt until the user iPhone is unlocked using a passcode, Touch ID or Face ID. Considering the time required for the brute force unlock of an iOS device, this feature will further prevent the third party personnel to access the data on a device running on iOS 11.4. The same scenario can't be played out again since the iPhone in question would have just shut down the Lightning port after 7 days. You can also try to delete the faulty message from another iOS device linked to the same iCloud account. Specifically, Apple noted that users would be required to re-enter their device passcode to authorize a Lighting-connected USB accessory if it has not been connected to the device for more than a week. Since 2016, the issue of access to data from devices has been a hot topic.
The company has announced that starting July 2018, all iOS app updates must be compatible with the notch-based iPhone X. The only thing the port will be good for is charging. The new feature is named as USB Restricted Mode, according to recent reports. The company and authorities are nearly playing a game of cat and mouse, with police doing everything to thwart Apple's safeguards, even going as far as using dead people's fingers. Once this happens, you will no longer be able to pair the device to a computer or USB accessory, or use an existing lockdown record, without unlocking the device with a passcode.