UserresU
Currently, 99,9% of smartphones market devices are vulnerable to an AFU exploit.
Google Pixel 6 until the latest are the only ones known to being capable to stop an AFU exploit. But for how long ?
When your device is seized by law enforcement, they can keep it for a very long time, for years and even forever in some countries. During all this time, they can keep your device on ,a new AFU exploit could be found and your data compromised if auto-reboot is off
(maybe an exploit is already known and they can use it during the seizure within a couple of minutes or hours)
Your best option is to have your device off or auto reboot set to the minimal amount of time before they use MSAB or Cellebrite tools.
When your device is off or have been restarting without being unlocked he's in BFU and encryption keys are no longer cached in the device. A forensic examiner can only access your device if he knows your passcode or find it with a brute-force attack.
Google Pixels with a tensor chip can protect your device against a brute-force attack but again for how long ? You should set a complex password rather than a 6 digits pin. Do not believe that something is secure forever.
Your fingerprints can easily compromised your data, so don't use them as a screen lock.
Your lock screen passcode can be compromised by cameras or someone watching behind your back.
If you don't mind charging your phone while it's power off, then set the USB-C port to OFF
Use a common 4 digits pin as a duress password, if the forensic software do not disable duress password before brute-forcing your device, there's a big chance that all the encryptions keys will be erased.