The fact that such requests exist, and that solving this problem is not a priority, we found out here:
https://discuss.grapheneos.org/d/30620-connections-to-poolntporg-despite-automatic-date-time-zone-turned-off
https://discuss.grapheneos.org/d/24017-random-connections-to-ntp-pool
https://github.com/GrapheneOS/os-issue-tracker/issues/5791
What are the privacy and anonymity consequences of NTP requests to pool.ntp.org servers from Samsung GNSS module?
Help me visualize and realize, please
I planned to enable default graphene system connections only from one conditionally secure home location. For the other travel/guest locations, I planned to disable default system connections and use VPN.
If there are NTP requests that I can't control, then every "travel/guest" internet connection will leak ip address. Since I use a VPN, user requests will go through the VPN and system NTP requests directly. This also opens up the possibility for correlation attacks.
Am I right?
Is there any solution to block/disable these requests?
If not, then maybe I should have bought a pixel without Samsung GNSS. How to know the right model list?