Firstly, sorry if I lack understanding about how mobile devices handle crypt differently to standard desktops.
I've been using GOS and have had a read of the FAQ concerning the how the crypt is implemented. I notice that after restarting the device, only the PIN is required to sign in. If 2FA is active, subsequent unlocking requires both the fingerprint and the PIN.
If using profiles, one need simply logout of the profile to bypass 2FA. This means that each profile should ideally have a strong password, which is not ideal if switching often between profiles.
From the FAQ:
The OS derives a password token from the profile's lock method credential using scrypt. This is used as the main input for key derivation.
A PIN of even nine characters means a total of one billion (109) combinations, giving an entropy of ~ 29.9 (log2(109)). This is in no way considered strong by today's standards, even if a strong argon2 KDF is used (which it cannot be as phone hardware is limited). I have read that authentication attempts (on the UX level anyway) are throttled on incorrect authentication attempts, but I'm sure someone could physically dump the flash memory and attempt to brute-force the file encryption key (FEK) anyway?
Is there a way to require key derivation from biometrics and to require 2FA whenever the device is restarted? Even if the owner profile uses a strong password (~ 32 chars) that's still 1FA and does not require the physical presence (or worse) of the owner in order to be better attacked.
Thanks