This document summarizes research on analyzing iOS device protection cryptography and potential attacks. It describes the iOS key hierarchy used for encryption, including how the UID hardware key is used to derive other keys. Methods studied include extracting AES keys from firmware, compromising code signing by patching the kernel or downgrading firmware, and extracting SHSH blobs to enable future downgrades. Further research is proposed to fully extract AES keys and compromise code signing.