zz:
Re: “Beyond that, no one can get to your device without the password or faceid, or fingerprint. No one.”
A few years ago, there was a terror attack in California. Afterward, the FBI took the terrorist's cell phone to Apple and asked them to decrypt it. Apple refused. They didn't say they couldn't; they said they WOULDN'T. A battle ensued.
After a few weeks, the FBI dropped the matter, stating that they had decrypted it themselves.
Don't you remember that? Maybe you need to be educated.
Quite apart from that, Apple controls both the hardware and the software on its devices. There is nothing preventing it from building secondary BACKUP cryptographic modules into its devices, modules to which Apple has the requisite key. Nothing.
You're obviously a very trusting soul. But when it comes to security, being trusting is S-T-U-P-I-D. Really, Apple should be building hardware encryption into its devices, then implementing an independent vendor's software to encrypt the cipher text. Only the independent vendor could initiate the decryption. THAT is how solid security is implemented.
But Apple doesn't do that. They want to retain control.
Authority that you claim to be, you really ought to know this.

Gold is $1,581/oz today. When it hits $2,000, it will be up 26.5%. Let's see how long that takes. - De 3/11/2013 - ANSWER: 7 Years, 5 Months