polygraph What particular analyses of the proprietary components have been made? What did those reveal and what protection measures have been implemented? In general, how does Graphene OS protect from potential malware in the proprietary components?
Ultimately, no software can protect against malicious hardware. Recommended reading:
https://discuss.grapheneos.org/d/10150-not-your-average-why-pixel-thread/7
Note that GrapheneOS uses extensive sandboxing, not just for user-installed apps, but also OS components. GrapheneOS also hardens the kernel, which is very important.
polygraph how is Graphene protected against someone tampering through physical access?
No software can protect you against physical tampering. Not even GrapheneOS's Auditor app. Someone could, for example, insert an independent microphone+antenna combo into the shell of your phone to record you and transmit.
polygraph How does Graphene protect from side-channel vulnerabilities? E.g. can JS running in a browser do something malicious? (which used to be an issue when Spectre was initially found and probably still is on some CPUs)
Firstly, Vanadium activates a form of site isolation (sandboxing) that's stricter than the one used in Chromium/Google Chrome even on desktop. Secondly, it's very apparent to me as a user how much the GrapheneOS team cares about quick and good patching of security vulnerabilities, and by using GrapheneOS you're already protected from many vulnerabilities even if you (for some reason) choose to not use the security preview releases (I strongly recommend you to opt into the security previews, they're stable-quality releases, and the GrapheneOS team can see the patches they apply). Thirdly, Vanadium by default disables JIT compilation (with a per-site toggle) to further decrease the chance that an exploit would be successful. And finally, the “recommended” (not “supported”) devices list on the GrapheneOS website lists Pixel 8 and later, which was released in October 2023, so I'd imagine that any hardware vulnerabilities discovered until then had been fixed thoroughly, especially given that Pixels are designed by the same company that creates Chromium, the leading browser in site isolation currently.
polygraph Can unwanted apps be completely removed? (e.g. SIM Toolkit or Vanadium)
The system partition that contains the preinstalled apps is read-only, and any change in it would either get corrected automatically when you reboot, or cause your device to fail to boot the next time you reboot it. This is assuming you've locked your bootloader, which is required in order to complete the installation.
You can do various things like changing system apps' permissions, using ADB, etc but none of it would free up any space from the system partition, none of it is needed (GrapheneOS contains very minimal bloat, it's actually intended to be vendor-neutral as claimed in the top of the features page on their website), and some of these tricks could harm the security of your device or require you to do a factory reset. I strongly recommend you to not mess with system apps. There are menus to switch the default handlers for various kinds of apps, and select/clear selection for choosing a default app to handle specific file types, links, and URI schemes.
polygraph How does Graphene address the issue with apps requiring too many permissions (e.g. a banking app requiring access to camera which has nothing to do with e.g. checking one's balance or wiring a transfer)?
GrapheneOS is aware of apps coercing users to enable permissions. They've talked about it in the past. There is already the existing Storage Scopes and Contact Scopes features, and I've seen posts from their official account stating that they want to add more Scopes-like features. Stay tuned :)
polygraph What is the way to use DNSCrypt on Graphene?
There is a builtin DNS-over-TLS client for the entire OS (sometimes automatically uses DNS-over-HTTPS instead, if it detects a DNS provider hostname from those it has hardcoded) configurable in the Settings app, in Networj settings, in the “Private DNS” item.
Vanadium also has a builtin DNS-over-HTTPS feature separate from the OS, which you can find in the the security settings inside the Vanadium app.
polygraph Or is there a way to revert to the stock Android OS if not?
Open the official GrapheneOS installation guide from the main website, and check the table of contents. Scroll to the end.
polygraph I hope this is the right place to ask.
Yes. Welcome :)