Hi, just wanted to double back on the fastboot issue. Afaik this has now been fixed up. Am I correct that regardless of how fastboot is accessed, ram is now fully wiped prior to usb being enabled?
My main concern which I never found out the answer to, was if usb wipe was enabled on owner profile, ending session should still wipe keys from ram. Then if usb triggered on owner profile the second profile would still be safe.
As usb wipe was always active in background; my concern was if you were in secondary profile and someone plugged it in, the keys/data for second profile would still be in the ram - then an attacker could hypothetically ram dump second profile and exploit the fastboot vuln.
With this being out of the way, would you say that usb wipe is now ok to use? (Again noting that I understand these factory resets are not optimal, there is duress feature coming, these can be bypassed etc) - just want to make sure there is no additional vulnerability by turning this feature back on
(Yes I know there is now a hardware disable for usb data, but there are still some usecases and requests for the usb kill feature on my end)