userofgos I did read it. I understand that when the OS is working correctly, there is little risk. I just don't know if the OS has sophisticated malware on it now. My hardware seems fine and the hash is the same. So, I don't know what that means.
One possibility could be that the OS was attacked during the upgrade or prior to that, and now the entire system is compromised.
Many sophisticated agencies have created things like Peaguses. Graphene OS users would be a more valuable target for such types of hacks. I can't discard the possibility this is a sophisticated hack. If it is, the system itself could be corrupt and showing the expected hash but still be compromised in some way.
There is also a cellular modem in this device and if I am hacked, it could be off airplane mode right now and exfiltrating data using the cellular modem.
If my understanding of advanced malware is wrong or if this is theoretically impossible, please educate me. I am not among the smartest most knowledgable people on this forum, I am a technology enthusiast at best.
I have still used the phone since the "corruption" error, but will likely stop using it soon. Even if it's not advanced malware, then likely the hardware is damaged. Google won't repair the hardware without my name and information and also won't do it while GOS is on the pixel. So why bother then? If the hardware is so damaged, I need a different iption anyway.
I would feel more secure doing this if I were using a Qubes system and could attach it to a disposible template, but I'm not and don't have access to one.
I guess I could actually use a Live distro to do it and then reflash the bios on the system after? It would probably be hard to infect some other sort of firmware on the system. It just feels uncomfortable. Could advanced malware infect another type of firmware?
My system is not Qubes capable. Is there a way to isolate the phone so it couldn't do anything if it were infected? Would malware on a phone have to get root priviledges to install malware? It probably would. I could just change the live distro to have a strong admin password.
Am I being irrational in this concern, even if I were to have a very high threat model?