So I was looking at the forums and saw that a pinned post mentioned that according to Cellebrite they cannot crack into a GrapheneOS device if it's been updated since 2022, except for ""consent"" based extraction (giving up your password). The thing I'm wondering is, GrapheneOS has a bunch of additional security features and reduced attack surface, but what is most likely the vulnerability type or method they were using to crack into stock Android phones that isn't effective against GrapheneOS? Or what GrapheneOS fixes/features prevent them from getting the data on the phone in a readable state?
Sorry if this is a dumb question, I'm newly interested in cyber security :)