- Edited
Intellectual2 The question in your thread title is overly vague and doesn't really make sense. Thread has been unlisted because it started getting answers about different things than what you actually seem to want to know.
Based on the post itself, what you're asking is about the security of encryption for a device that's at rest not security of the OS itself. GrapheneOS provides an auto-reboot feature for getting the device at rest automatically before an attacker has time to exploit it, especially without taking the risk of causing a reboot with a failed/detected exploit.
Please read https://grapheneos.org/faq#encryption which covers how the encryption is implemented. You don't need to worry about an attacker breaking the encryption itself. An attacker has to brute force the PIN/passphrase. For the iPhone case you bring up, the person had a low entropy PIN as their credential, which is not secure against a brute force itself but rather relies on anti-brute-force features provided by the device. Pixels and iPhones provide this with a secure element, requiring a sophisticated exploit to brute force even just a random 6 digit PIN. This is why a random 6 digit PIN provides secure encryption with Pixels and iPhones.
You can do better with a random passphrase. There's also hardware bound key derivation as the final phase of key derivation to prevent easily offloading brute forcing to a server farm instead of only doing it on the phone itself. If an attacker can exploit the secure element to bypass Weaver (aggressive throttling forcing 1 day between attempts after the initial ramp up) and can extract the hardware bound key from the SoC hardware, which is meant to be burned into silicon, then they can do a brute force on a server farm, in which case you want a strong random passphrase. Make it strong enough and it can't be brute forced. If you go as far as using 7 diceware words or 18 lowercase letters + numbers, then that's secure against any brute force itself. You can also go for something more convenient but less secure which relies on the key derivation work factor.
Worth noting encryption keys (derived key encryption keys and random disk encryption keys) are per-user-profile and encrypt the data within the profile. Owner (initial user) is special and sensitive OS data is encrypted inside the Owner profile data. This is the reason you must log into Owner before other users.