I'd like to revive this thread in hopes of getting a more comprehensive answer.
My setup is essentially different profiles for different purposes, with the primary profile not being the owner profile. So I have a second profile that I use daily as my actual profile, and several other profiles for other purposes for example Travel.
My goal behind several profiles is to segment data and apps across profiles, so the data and apps not in use are better protected. If I hand over my phone to a border agent while traveling, I would be inside the Travel profile with no personal data or apps other than what is necessary for travel.
I have strong passwords on the owner and primary profile because I use those daily and they have the most sensitive access. I wouldn't really want to use such a strong password for other profiles that I rarely use, because it would be a lot harder to remember and annoying to type when I do need it, especially if the profile doesn't have much sensitive data if at all. The primary reason I bring this back up is to gain a better understanding of the following comment from this thread.
If an attacker has access to any user profile, a huge amount of attack surface is exposed.
Could someone elaborate on this? If someone has (or gains) access to an arbitrary user profile, how much easier does it become for him to access my primary user profile and/or data within it (data at rest vs. not at rest), or any other user profile for that matter? I'd like to also consider the scenario where one has a distrust for the secure element (ie. assume it doesn't exist or doesn't work). While I do trust the secure element, my most sensitive profiles do still have passwords that don't rely on the secure element as a "just in case" or "why not".