Stewart
I can understand and share your idea of achieving the best possible protection for let's say the journalist in your example. I just don't think that removing the logo will work as intended:
If a journalist's phone, for example, is restarted in the hands of the security forces,
Why would security forces voluntarily reboot a device in BFU (which would significantly worsen their ability to extract data from really any modern device) just to check if a GrapheneOS logo shows up on boot?
And even if it would be possible to remove the GrapheneOS logo an adversary's with the capacities the adversary you describe would probably know and look for other indicators, f.e. the boot hash, as de0u already pointed out.
If I were a torturer in a regime that doesn't respect human rights and knew that the duress password exists with GOS, I would have first tortured the journalist
We can discuss a lot in theory about what an imagery regime you outlined would do - but since there are other (albeit probably not so well implemented) ways to wipe a device (e.g. Wasted, removing a logo only protects the imaginary journalist from torture to a very limited extent: The adversary would have to assume that an app like the mentioned one is installed and torture him anyways.
Whereas if the logo was hidden and the journalist was forced to give the password, you'd think it was a bug, bad luck, etc. and it would be harder to prove that it was an option linked to an alternative operating system.
An experienced actor (especially one who is already looking for a GrapheneOS logo and therefore probably knows the CustomOS and its feature) will not suspect that this was just a bug.
GrapheneOS developers and moderators have stated various times that a secure wiped device and plausible deniability of that wipe are not possible with Duress PIN, see for example:
it would not be possible to hide from someone who is aware the feature exists, especially if they have physical access to the device for a prolonged amount of time.
The duress PIN/Password is meant to irrevocably wipe the device's contents. It's not meant to be stealthy. That's a goal that can't be meaningfully achieved.
source: https://discuss.grapheneos.org/d/17901-duress-pin-idea/5
and
As has been mentioned theres clearly a use [for Duress PIN] where the risks of an adversary gaining the data on the phone outweigh the risks from an adversary knowing youve destroyed all the data on the phone.
Also theres potential benefit to everyone who uses GrapheneOS even if they dont have Duress set. If an adversary knows that there could be a duress PIN or password set it acts as a deterrent against attempts to brute force the unlock PIN/pass.
Similarly could also potentially deter attempts to force someone to reveal their PIN/pass as it gives the potential for them to supply the Duress PIN/pass and cause irreversible data loss.
source: https://discuss.grapheneos.org/d/17901-duress-pin-idea/23
GrapheneOS features seem to aim at protecting device owners as much as possible against really capable adversaries.
For let's say simpler situations, like a random border control, I personally think there are perhaps better ways to superficially deceive an not so capable adversary than removing a CustomOS logo (maybe a well set up fake profile, for example).