If someone had to jailbreak your device and bypass their access code, information protected by the data protection API will remain encrypted and therefore inaccessible, since your access code is an important fragment of the decryption key is unknown.
Data protection is automatically enabled by setting a password on the device.
The trick, however, is that the data protection feature only protects data in applications specifically designed to use the data protection API.
As for the built-in applications, this is only the Mail application and third-party applications that actually use data protection functions are surprisingly rare;
GoodReader and Box.net come to mind as good examples, but many other file storage applications, such as Dropbox, do not provide this support, which means that your cached data is no more secure than your physical ownership of the device.
This means that if you are worried about maintaining confidential data with secure encryption, you will have to look only for third-party applications that support the data protection API.
It’s also important to remember that any applications that use iCloud storage cannot use Data Protection , since the two are mutually exclusive due to the need to synchronize the background of iCloud data when the device is locked,
Even GoodReader, for example, notes that documents that you want to save in the iCloud section of an application will not be protected with Data Protection encryption.
Of course, even data protection is only as secure as the password on the device. Using Apple Configurator, you can configure the requirements for more complex code policies on devices to improve security in this regard, as well as enable automatic removal of the device after a certain number of failed attempts.
Read more on here.
Durai Amuthan.H Aug 29 '13 at 2:55 a.m. 2013-08-29 14:55
source share