someone27281 Oh also I am using a Always on VPN with leak blocking. The local IP info it showing is NOT the VPN's, it's indeed my local network's. So much for different identities.
This is a major concern. This was one of the things I worried about might actually be the case, and had on my list of things to check, but didn't get around to. For many users, it is probably only a LAN IP address, if you are behind a NAT, which most are, but it might very well be your publicly routable IP address too. This may mean some apps would inadvertently leak your publicly routable IP address even when you are routing all traffic through a VPN for anonymity reasons. Same with 4G/5G IP address of course. So way worse than it merely being usable for fingerprinting.
Here is where I was thinking about this possibility:
https://discuss.grapheneos.org/d/20052-android-15-vpn-inbound-traffic-changes/7
The whole VPN design in AOSP is so poorly done. There will only be more and more things like these that keep popping up, unfortunately. It is a blacklist approach, trying to plug leaks as they gets discovered, instead of the VPN feature being designed in an actually secure way from the beginning. Unfortunately, there might not be that much the GrapheneOS developers realistically can do about it, other than keep plugging leaks like this. At least not until we can run most things in virtual machines on our phones.
someone27281 It is ABLE to access SIM data, getting operator name, APN, Country code
This was known to me, and have been mentioned many times on the forums. All apps can see exactly which country you are in, by reading operator information from the SIM card, allegedly even when device is in airplane mode.
Unplugging the SIM card is the only way to prevent this. I believe there is a ticket somewhere on the bug tracker about fixing this, and that the GrapheneOS developers are interested in fixing this leak. But it is not that serious. Apps can usually guess which country you are in anyway, because of configured timezone, system language or keyboard layout, and which country you are in is not allowing to locate or identify you specifically.
The IP address on the other hand might be far more concerning, and I did not know about that.
someone27281 It is able to access almost all WiFi related info, like Gateway, DNS, local IP addresses, WiFi type, signal strength etc.
Is it able to access SSID or BSSID of the connected Wifi? That would also be a considerable concern if that is available when using a VPN for anonymity. It is not clear from your screenshots whether that is the case. It is not as serious as IP addresses being available, as the risk apps are inadvertently leaking that is probably somewhat lower.
My understanding is that information about SSID and BSSID are guarded by Nearby Devices permission. If that is the case, nothing to worry much about.
someone27281 Specific Device ids and Google DRM ids
These should be app specific. In the case of MediaDRM identifier, I think I have heard it is the same for the same app, if the same app is installed in multiple user profiles. But it should be different for each app, and after factory reset. Thus it is not that much of a fingerprinting concern.
someone27281 So for anyone thinking of using GrapheneOS for anonymity, it does NOT provide anonymity. It is indeed the best we have, but it's CLEARLY not perfect.
It is the best we have for mobile phones, but for computers we have better alternatives for anonymity. QubesOS is correctly designed in most regards, from the beginning, just to mention one.
someone27281 Anyway, do GOS plan to further harden and anonymise the app sandbox?
I certainly hope the plug the IP address leak somewhat quickly now when that has been discovered. It is just unfortunate this was not discovered before, as there apparently is an app already that shows this information, and the GrapheneOS developers said they checked a lot of things pretty thoroughly back when they plugged the last set of leaks.
There are other known issues with profile isolation that have pretty low priority though. Like the network loopback device reuse issue.