"In another Orwellian measure, Pyongyang phones' government-created operating system takes screenshots of the device at random intervals, the two defectors say-a surveillance feature designed to instill a sense that the user is always being monitored. The images from those screenshots are then kept in an inaccessible portion of the phone's storage, where they can't be viewed or deleted."
Hypothetical: What if the images were instead kept inside an Apple "Secure Enclave". The Secure Enclave is equipped with a dedicated secure nonvolatile storage device. How could the owner of the device access and delete them.
I don't think you need to be so defensive. GP is not saying that's how it works today. They're speculating about how existing technology can be repurposed to do evil things.
It's more like a TPM, HSM or ARM's TrustZone than it is an encrypted disk. You can use it to enable encryption of data elsewhere on the device that the user doesn't have access to, among many other things.
Hypothetical: What if the images were instead kept inside an Apple "Secure Enclave". The Secure Enclave is equipped with a dedicated secure nonvolatile storage device. How could the owner of the device access and delete them.