lawman
From the forum responses it seems that the developer approach tends to be that if a solution won't work against NSA level opposition, its not worth doing.
This is a disingenuous misrepresentation of our position. What you're requesting is that we add things which are easily detected by unsophisticated adversaries including with automated tooling distributed to them. Features added by GrapheneOS will be broadly known and forensic tools will add support for them. Adding features which do not work against adversaries using a tool aware of them isn't something we're interested in doing.
1) PIN 1 = Delete private space and enter main profile (even if NSA could see this, others can't).
The presence of a Private Space will be easily detected by the standard forensic data extraction tools used by low level cops and border guards. The tools without advanced exploits are used via developer options and ADB.
2) PIN 2 = Log into dummy profile without ability to access or be aware of other profiles.
It's extremely easy to see that it's not the Owner user and the standard instructions for extracting data will not work which contribute to making that obvious. The guides on using the tools can explicit cover this.
3) PIN 3 = Data reset and reboot (without showing error message).
Why would that be useful compared to the existing approach?
4) PIN 4 = Wipe phone (without showing message + don't show graphene recovery screen). So it looks like a bricked phone.
The existing duress PIN/password wipe already looks the same as the data getting corrupted at a high level, which has little value since a low level analysis will show it was clearly wiped.
I remember years ago when drivecrypt was created. I suggested for developers to create a system crash message when wrong password was entered. That was implemented and much more useful than stating wrong password, in many scenarios.
We could avoid it saying that it's the wrong password if it's the duress PIN/password but it's still going to clearly wipe the device.
Hope the developers consider allowing a spectrum of solutions which has usefulness to most users, rather than binning anything which doesn't work against NSA, as this limits the solutions and features of GOS.
This is a misrepresentation of our approach. Keep doing it and you'll be suspended.