- Edited
I read preliminary investigation from Swedish police manage to unlock two Pixel 6a GrapheneOS version 2023030400 was confiscated in turned on mode, Police manage to unlock first Pixel 6a 2023/12/30 and second Pixel 6a 2024/01/15 date according to the preliminary investigation protocols The phones were in the on mode (AFU mode) unlocked but another Pixel 6a in the same case seized in the on mode date 2023/05/01 with GrapheneOS version 2023/05/0100 the Swedish police do not manage to unlock The police used the Cellebrite Physical analyzer version 7.66.0.9 with cable on and Cellebrite UFED
Edit by GrapheneOS: Appears to be a misinterpretation of the documents, which do not refer to GrapheneOS in any way. Cellebrite's official documentation says they can exploit all major Android OEM devices running the stock OS both BFU and AFU, but cannot do a brute force attack to get data from a BFU Pixel 6 or later (implying they can't currently exploit the Titan M2 even for out-of-date devices). Cellebrite's official documentation also says that they cannot exploit GrapheneOS either BFU or AFU unless the patch level is earlier than an unspecific late 2022 patch level.