SeaPanda117 I am asking specifically about the theory that the OS could use the NPU to grab all your conversations that you have in Signal pre-encryption. That is precisely what an NPU is designed to do, analyze what’s happening on device. This would allow the OS to analyze and (possibly) report back on what you are messaging without having to break the encryption.
In this case, the OS is GrapheneOS. The OS doesn't do this.
I'm curious where you heard of this theory. Different hardware on the device isn't "designed" to spy on people, but apps or services can use hardware to speed up processing of data they have access to I suppose, which could be a concern when giving apps access to too much (like all of the photos on the phone). Part of the point of GrapheneOS' compatibility layer is to allow us to run Google Play and the other apps as regular apps without them needing privileged access. They have access to so little, so using them is way less risky if your goal is to reduce the personal data they have access to.
SeaPanda117 If someone uses GrapheneOS and logs into the sandboxed playstore I know that all those apps will intercommunicate the same way they would on Google’s Android.
IPC only works if both apps are set up to communicate with each other. Computers are stupid and apps can't just talk to each other. Signal won't just start sending information to Google Play just because it's there. Google Play definitely can't make Signal or other apps start sharing private data.
You can consider looking into Molly, which is a fork of Signal. They have a FOSS version that you might be interested in:
To support a 100% free and auditable app, Molly comes in two flavors: one with proprietary blobs like Signal and one without. They are called Molly and Molly-FOSS, respectively. You can install the flavor of your choice at any time, and it will replace any previously installed version. The data and settings will be preserved so that you do not have to re-register.
(from their GitHub)
SeaPanda117 MS Recall
For this kind of thing to work, it would have to have very privileged access. There's nothing like this in GrapheneOS, nor can any app get the kind of access required to perform this level of spying.