Overlay1404 Is verified boot a deterent against physical attacks (ex: compromises by the refurbisher)?
My understanding is that verified boot ensures that the bootloader, baseband firmware, and system partition are signed by either Google or the third-party signing key, and that the signing key hash is displayed if that is installed and used. So if a refurbisher were to install non-standard baseband firmware that hadn't been signed by Google that would be flagged by verified boot. However, verified boot, as a software mechanism, can't detect arbitrary tampering with hardware.
Overlay1404 Can verified boot prevent vulnerabilities in (even verified / unmodified) privileged blobs like bootloader / init / recovery / fastboot images?
If the question is whether verified boot can automatically inspect software on the device and detect all vulnerabilities, that is impossible.
Overlay1404 Does GrapheneOS attestation detect extra hardware such as hidden microphone? Even if said hardware does not tamper with the system at all, assuming there’s enough available space in the case.
If the question is whether software running on the motherboard has eyes that can see inside the case, despite it being dark, and report on small objects included inside, that is not possible.