The method for extracting data requires access to the phone and the user's laptop. When someone has physical access to a device, the vast majority of security goes out of the window (sans disk encryption).<p>This is very different from remote monitoring of a user's data in Apple's data center.<p>Obviously, privacy needs to be addressed in the larger political arena, however Apple's moves here should be applauded.