To be specific, for many phones if they are turned on you can just plug them into a Cellebrite box and get immediate unlock. Unless you follow strict message discipline in keeping the phone powered off it is very difficult to avoid this attack.
Tossing the database encryption key when idle is a form of segmentation in time, and is a considerable constraint on attackers.
Tossing the database encryption key when idle is a form of segmentation in time, and is a considerable constraint on attackers.