See this blackhat paper for some detail. https://www.blackhat.com/docs/us-16/materials/us-16-Mandt-De...
Maybe for a casual reader, but nothing is misleading about the headline unless you don’t understand how Apple’s Secure Enclave Processor (SEP) works.
For more on that, as mentioned in the linked page, there’s the “Demystifying the Secure Enclave Processor” talk from Blackhat:
Or here’s the PDF:
The prerequisite for mounting this attack is kernel code execution already :
> We show that a malicious kernel driver ...
As per  the Power management unit is shared between the Application Processor (AP) and the Secure Enclave Processor (SEP) so this attack might work against iPhones as well.
There was a nice in-depth analysis of the SEE at . Furthermore, Apple has been very fast in fixing security issues, and rolling out updates to all of their user base, as opposed to the "These issues probably will never be fixed, buy an S8 instead" mentality shown from the Android vendors.
TrustZone was announced 2012 (?). The Security Enclave is a separate very Apple designed chip. They've patented aspects of it, dated also 2012: