Agreed. I was just suggesting that this is just one feature that is available on GrapheneOS that can be used to help determine the phone is running GrapheneOS. Maybe not enough evidence to prove it's definitely GrapheneOS, though.
Like here's how I see it:
This results in every app sharing the same initial memory content and layout, including sharing secrets that are meant to be randomized for each process.
It cripples these security features since every app has the values for every other app and the values don't change for fresh app processes until reboot.
My thinking is that on regular Android with the Zygote model, apps "share secrets that are meant to be randomized". So, if an app went through the trouble of checking these secrets, then they'd be able to determine a phone is using the zygote spawning model if the app has the same secrets each time it's launched. Or, if for example Meta checked this with Facebook and Instagram, the secrets are the same for both apps until reboot.
Apps would know the phone hasn't been rebooted since they can receive a boot completed broadcast.
However, if the secrets do change every time the app is launched, they can determine that the phone isn't using the zygote spawning model.
that said, I don't actually know how an app would get access to these secrets. I could be wrong, and happy to learn more about this if I am :)
And I realize that this thread is about "standing out." I kind of got excited and started to talk about ways to fingerprint GOS users... My bad.
Also, to be clear, I'm not calling this stuff out as a "bad thing." Secure app spawning is obviously beneficial.