- Edited
I want to preface that i've read all the information about Auditor and Verified Boot but it is a little hard for me to apply the information to the following case:
Assume someone has a Pixel device with Stock OS and it is seized during an airport check. After the device is returned, they want to flash GrapheneOS but are unsure if the device is compromised.
How would they go about ensuring it is not compromised? Should Auditor be set up on Stock OS beforehand?
Obviously, after flashing GrapheneOS and finding that the verified boot key hash doesn't match then the device was compromised and likely won't even boot. This is the obvious scenario.
However, is there a way for the device to be compromised before flashing GrapheneOS in such a way that the verified boot key hash matches but the device is still compromised from the initial customs check? Will Auditor detect anything wrong if it was set up after this theoretical compromise has already taken place?
Is there a scenario where Android Verified Boot key matches but Auditor fails the check on GrapheneOS?
Assuming there is a scenario that exists like above, what would the next best step be? Re-flash GrapheneOS?