My understanding of how Eric Adams did it is he took the phones into the bathroom and changed the unlock keys to random and instantly-forgotten strings. That way nobody could force him to reveal it. But that plan relies on being handed the phones and allowed to go into the bathroom.
There is a constant cat and mouse dynamic between the companies that make mobile phones and their operating systems, namely Apple and Google, and the firms making tools to break into those devices.
Where google is concerned, that is a very kind way to put it.