horde Does that mean that on GrapheneOS with MTE enabled it would have prevented this attack completely or partially?
That is essentially two questions. This is not an expert opinion, but the blog post mentioned specific issues in the standard Android storage allocator, which I believe GrapheneOS does not use. And it is possible that Google Messages runs with MTE on GrapheneOS but not on Google's stock OS (I don't have a device with MTE, so I can't easily check). Finally, basically 100% of users of Google's stock OS have Google Messages installed; some fair fraction of GrapheneOS users don't, so those of us without Google Messages don't have the code path involving the Dolby codec that was the first step in the chain. Less code means less attack surface, in general.
But the other question is whether an attacker with this exploit would have been able to adapt it successfully against GrapheneOS. Developing the attack took a fair amount of work, and trying to retarget it would as well. Perhaps right now somebody is trying!