You're totally right that apps in the same profile can talk to each other via IPC, and without something like App Communication Scopes, we can't achieve full isolation between them. So yeah... separate user profiles are the only robust way to enforce strong boundaries right now.
That said, I still think granular per-app network controls have real value, even within a single profile. For example:
A per-app VPN kill switch can stop data leaks if the VPN disconnects, without affecting the whole profile.
Blocking access to specific IPs/domains or the local network can limit telemetry, fingerprinting, and attack surface, especially for apps that shouldn't touch LAN devices.
Routing different apps through different VPNs/SOCKS proxies can compartmentalize risk or bypass regional blocks, helpful for advanced users.
Even a compromised app can't just exfiltrate data if it’s locked to a certain proxy or domain set.
I totally agree that these controls won't stop IPC-based leaks or intentional collusion. But in practice, they still raise the bar significantly, especially in a defensivs setup and would nicely complement profile isolation when full separation isn’t practical.
Would love to see both App Communication Scopes and per-app network policies make it into GrapheneOS eventually.