cdflasdkesalkjfkdfkjsdajfd this guy has absolutely no idea what he's talking about and is completely disregarding how the Android permission model works. Blatant lies and misinformation.
Firstly at 00:03 he starts off saying it's a "Graphite spyware compromise" which is false because A) it's not a compromise and B) the graphic he shows at the end is a Cellebrite Extraction report which is a completely different extraction/forensics tool by an entirely different company.
Secondly, he is misunderstanding how the microphone/Android permissions work. See here https://discuss.grapheneos.org/d/10202-camera-permission-not-enforced/14
Allowing once has a timer after it stops being used before it stops being usable again. Closing the activity or force stopping doesn't reset that, the timer still applies. That's just how Android's permission model works. Worth noting that the the app must be in the foreground to use the camera or microphone, including when allowing only once. It's not only for the allow while using the app setting but also allowing a single session.
Also here: https://discuss.grapheneos.org/d/24153-the-ask-every-time-permission-doesnt-actually-ask-every-time/2
GrapheneOS holds up against these forensics tools, especially when the device is BFU, and also AFU when Auto-reboot is enabled. See here: https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation
However, in this case, it appears the tool is being used while the device is AFU and already unlocked so it is possible to perform a Full Filesystem Extraction but that doesn't change how the Android permission model works.
Note: I do not speak for GrapheneOS and am not a developer or forensics expert.