Graphene1 I believe I got most of the details correctly. Let's break it down:
Backporting: The act of taking a feature, program, etc from the future and making the necessary tweaks and release procedure to make it available on something in the past. This is a general definition because it's not specific to GrapheneOS or even Android. There's two kinds of backports relevant here to GrapheneOS, see below.
AOSP (Android Open Source Project): AOSP publishes a new major version every quarter of a year. Once per four of them is a yearly release with a major version increment, the others are Quarterly Platform Releases (QPRs). The GrapheneOS project said that QPRs are as large as yearly releases, they just keep many future features in disabled state (although Android 16 QPR1 is a good counterexample due to how different it is from the original Android 16). Every new major version (yearly and quarterly) has security design improvements (changing architecture of things to work more securely) and security patches (patches for specific vulnerabilities discovered).
ASB (Android Security Bulletin): ASBs are Android's backports of security patches from the latest major AOSP version to the last three to four yearly AOSP versions (currently the original Android 16, original Android 15, original Android 14, and original Android 13). The GrapheneOS project says that these backports are incomplete because they don't backport all of the security patches from the latest AOSP version.
PUB (Pixel Update Bulletin): These are the vulnerabilities in Pixel device code like Pixel firmware, Pixel drivers, etc. As far as I understand, not only is Pixel device code closed source, but (at least the firmware) must be signed by Google and thus must be built by Google and none of it can be modified by GrapheneOS. Google always ships the latest major AOSP version in the stock Pixel OS, thus they create Pixel device code for it in mind.
Now to the two backporting issues at hand here:
- PUB: GrapheneOS had to backport the Pixel device code from the Android 16 QPR1 release of the stock Pixel OS onto the Android 16 releases of GrapheneOS that we use now to provide the security patches in the device code. This is because Google has yet to publish any AOSP release at all in the past three months despite promising back in June that “AOSP is NOT going away”, so GrapheneOS had to retrofit the future device code onto the GrapheneOS releases based on an earlier major AOSP version. This may not be possible to continue doing in the future, for example the GrapheneOS project said that at the previous time they had to do this (backport Android 16 device code to Android 15 QPR2 GrapheneOS releases) was only possible because Android 16 and Android 15 QPR2 were similar to each other and wouldn't have been possible to backport it to the original Android 15 release. So Google must release AOSP as soon as possible, or we're screwed.
- ASB: Ignoring all the thing with the embargos, the ASBs are still incomplete backports, so GrapheneOS must have the latest major AOSP version to have all of the security patches and security design improvements of AOSP.
Regarding the embargos: Google used to release security patches (both as new AOSP releases and as backports in the form of ASBs) on a monthly basis. This was awful because it means they wait a whole month before fixing security vulnerabilities they were already aware of, but it was even more awful because they provided early access for manufacturers to both AOSP releases and ASBs, so they were distributed “internally” rather than kept secret, or fixed as they should've been.
But in June/July Google changed it so that there's no more minor monthly AOSP releases, only quarterly and yearly, and basically no more ASBs when there's no AOSP release in the month. Even worse, each month's ASBs are finalized early in the month previous to it — any more vulnerabilities patched will not be patched in the coming month's ASB, but in its next month (i.e. at least a whole month later). The former extends the unpatched time from 1 month to 3 months, and the latter from 3 months to 4 months. Even worse, Google is now permitting to release the embargoed patches to the public in built form without source code, making it even easier for attackers to reverse engineer the built form to see what was fixed, without having to hack/bribe/etc anyone who has access to the “internal” distribution of the embargoed patches. This doesn't impact manufacturers who make non-open source Android versions, but impacts GrapheneOS which is an open source project that wants to publish corresponding source code for their releases.
GrapheneOS wants to abuse this for their own benefit: publish patched built form releases containing the embargoed patches separate from the main releases, let external people reverse engineer them and publish source code for the embargoed patches based on that, and then GrapheneOS can take the embargoed patches from these external people and apply it to the main releases we use in our devices because the patches are then public. They don't necessarily have to wait for people to reverse engineer their patched built form GrapheneOS releases, as the GrapheneOS project also calls for whistleblowers to leak publicly the embargoed patches source code that's distributed “internally” to manufacturers.
This is why the GrapheneOS project published a post saying that they can release the December 2025 patches right now (i.e. in a built form without corresponding source code in a separate release from the main ones we have on our devices, and in the main releases if external people would be kind enough to leak the embargoed patches or reverse engineer the built form releases and create the unpublished corresponding source code), and why they now raised the security patch level to 2025-10-01. The 2025-10-01 security patch level was finalized a few days ago (early September). The 2025-12-01 security patch level isn't finalized yet, as more patches could be added to it over time, so GrapheneOS can't raise the claimed patch level within the OS to it yet. Depending on whether the 2025-10-01 security patch level contains zero or at least one security patch: if zero, then GrapheneOS didn't have to break any embargo to deliver us this update; if at least one, that means that GrapheneOS's plan to abuse Google's embargo system is already working, because Google hasn't published the 2025-10-01 ASB yet (it's still embargoed).
I asked a GrapheneOS project member in private and was told that Google's embargos on the patches don't prevent the GrapheneOS project from informing us whether the main GrapheneOS releases contain all of the currently embargoed patches. This means that GrapheneOS could inform us whether we're fully patched, because the security patch level doesn't (and never was, but now it's just significantly worse) inform us whether we're truly fully patched against all known vulnerabilities.