Where the author is correct
1. There is no absolute smartphone invulnerability
Yes. Any mass-market device will eventually get exploitsâthrough SoC, Secure Enclave / TEE, USB stack, baseband, DMA, etc. Cellebrite, GrayKey, and similar tools really work, especially in AFU.
This is undisputed.
2. AFU is the most vulnerable stage
Also true.
Once a phone has been unlocked at least once after boot, some keys are active, services are running, and the attack surface is huge.
This is exactly why GrapheneOS cuts USB access, reduces the attack surface, introduces auto-reboot, etc.
3. File-Based Encryption is a convenience compromise
Correct, with nuances.
FBE was indeed introduced to support:
It is a trade-off between UX and security, not a âpure winâ for security.
4. The user does not directly control the keys
Yes.
You do not âenter the keyâ yourself. Instead:
This is an accurate description of the trust model.
Where the author is mistaken or oversimplifies
1. âYour password does not participate in encryptionâ
This is incorrect.
On modern Android:
The password is not just a âsignalâ; it cryptographically participates in the process.
The claim âthe key is stored and can simply be extractedâ is a forum-level oversimplification.
2. âIf the chip is hacked, the data is immediately accessibleâ
Not quite.
Even if compromised:
-
rate-limit bypass is needed
-
hardware delays must be bypassed
-
memory access is required
-
proper boot context is required
This is why:
The author presents the Secure Enclave as a âcardboard lock.â This is false.
3. âDouble encryption = absolute protectionâ
This is naive thinking, very common.
Why:
-
if the SoC is compromised â password input can be logged
-
RAM can be attacked
-
TEE can be attacked before key erasure
-
attacks can occur before screen-off
-
side-channel attacks are possible
Two layers â magic. It only reduces risk, not guarantees invulnerability.
4. âFDE was safer than FBEâ
This is partly false, partly nostalgia.
True:
But:
-
old FDE had weak key management
-
worse multi-user protection
-
worse isolation
-
worse rollback protection
FBE is cryptographically stronger but architecturally more complex, and complexity = new attack vectors.