>>105996187 (OP)The keys for decrypting the data are stored within the phone and the phone uses them when loading.
So if you can break into the phone while the phone is active and has access to the data, then you can access the decrypted data.
It's kinda like a vault. If the door of the vault is open, it doesn't matter how good the locks on the door are.