From the forum responses it seems that the developer approach tends to be that if a solution won't work against NSA level opposition, its not worth doing.
I disagree with this approach. You can have different solutions for different levels of opponents.
Security is always a spectrum of compromises between extreme privacy/anonymity on one end to extremely practical/efficient on the other end.
The user should be given the option of which solution works best for them, in their varying scenarios.
I would have uses for each of the below, and I'm sure others would too - even if they don't pass the NSA threat model.
1) PIN 1 = Delete private space and enter main profile (even if NSA could see this, others can't).
2) PIN 2 = Log into dummy profile without ability to access or be aware of other profiles.
3) PIN 3 = Data reset and reboot (without showing error message).
4) PIN 4 = Wipe phone (without showing message + don't show graphene recovery screen). So it looks like a bricked phone.
I remember years ago when drivecrypt was created. I suggested for developers to create a system crash message when wrong password was entered. That was implemented and much more useful than stating wrong password, in many scenarios.
Hope the developers consider allowing a spectrum of solutions which has usefulness to most users, rather than binning anything which doesn't work against NSA, as this limits the solutions and features of GOS.
thanks