Personal anecdote, come to your own conclusions.
V1king Then he just hands the phone over to me. So I guess their tools couldnt get anything out of the pixel.
I saw it was not possible to get into a modern and up-to-date Pixel with tools like Cellebrite without wilful surrender of the unlock method used. I tried it. If the device was not surrendered with a method of unlock then police can't really do anything with it. You'd likely need a novel, unknown exploit to try something, which is quite difficult. As for GrayKey, they are iPhone-centric. While they also support Android devices they don't support modern Pixels officially, only via 'broad consent' (their shitty marketing way of saying a basic extraction - that's probably not as good as Cellebrite's standard settings...)
In addition, law enforcement digital forensics products such as Cellebrite UFED / UFED Touch typically also avoid supporting novel and harsh exploits to extract data unless they are public and after a while of time has passed. They only really get used as features if forensic integrity can be maintained like the ones GrayKey use for iPhones. Attempting something special has a massive risk of compromising forensic integrity of the device's evidence, which would make it invalid in to submit in court.
I have no knowledge of Cellebrite Premium and Advanced Services being able to do the better, but obviously if there is enough time, budget and focus, you can exploit anything.
V1king "What kind of phone is that?"
Depending on the country, I'd like to believe he lied and knows it's GrapheneOS.