That goes without saying. Anyone who really understood how the market would behave wouldn't be blabbing about it for free on the internet. Instead they'd be keeping their mouth shut and buying and selling stocks and getting progressively more wealthy.
It's not a secret and the stock prices have already moved. This is the just writing on the wall. When your biggest, most direct competitor fails in such an epic way as to have a full and complete recall after the recall and additionally have its product banned from airports you are in a damn good position. I mean, no the iPhone 7 isn't meant to be used underwater. The Galaxy Note 7 isn't allowed on airplanes, and if you fly the airlines are notifying ALL OF THEIR PASSENGERS TO NOT USE A SAMSUNG PRODUCT, which has escalated to, YOU WILL BE FINED IF YOU BRING A SAMSUNG PRODUCT TO THE AIRPORT. Not all attention is good attention. The ocean doesn't scream at you, DON"T USE THE APPLE IPHONE IN THE OCEAN!
Directory Comey made another misleading statement – twice – to Congress yesterday; namely that the FBI has attempted every possibility of unlocking the device on their own, and is even willing to accept input from any experts. Quite the contrary, at least three possibilities have come to light that the FBI has not yet explored:
The metadata of all files in the file system is encrypted with a random key, which is created when iOS is first installed or when the device is wiped by a user. The file system key is stored in Effaceable Storage. Since it’s stored on the device, this key is not used to maintain the confidentiality of data; instead, it’s designed to be quickly erased on demand (by the user, with the “Erase all content and settings” option, or by a user or administrator issuing a remote wipe command from a mobile device management (MDM) server, Exchange ActiveSync, or iCloud). Erasing the key in this manner renders all files cryptographically inaccessible.
So - if you copy that key - that one key that's, "not used to maintain the confidentiality of the data", then prevent the erasing system from working its magic.
The key is derived from a) a chip on the motherboard, and b) your PIN. The chip is specifically designed so that it ain't gonna tell you it's bit unless the PIN is right. You could probably get the hardware bit of the key by destroying the relevant chip to read it, but if you fuck that up the key is gone forever, and you still don't have a PIN. And the whole shebang kills itself (including the hardware bit of the key that you actually need if you wever want to read the iPhone's data) if you enter the wrong PIN 10 times.
The "Chip" you're talking about is the security enclave which is not on the iPhone 5C. The filesystem key is not stored in the security enclave. If you make a copy of the encrypted memory that stores the filesystem key bit for bit, then you've defeated the erasing system. It's also possible the FBI is terribly incompetent given they have multi million dollar forensic labs that can't figure out how to copy this memory.
Just because something is encrypted, doesn't mean you can't copy it. What's your source on this unreadable uncopyable "NAND" memory? Even if the filesystem key is stored encrypted by the UID and pin, if you can make a single copy of that encrypted block (and then repeatedly copy from that) - the complexity becomes a matter of brute forcing the pin (not the stronger UID or filesystem key). So, what's the story on this?