I asked in the matrix chat, but it was hectic at the time I posted, so most people probably missed it. So, I am reposting it here to hopefully get some answers.
Question: Are the secondary user profile's encryption key encrypted by the owner profile's key BFU? Is it part of the "sensitive system-wide operating system data" stated here?: https://grapheneos.org/faq#encryption
In this case, assuming all weaver tokens / keys have been extracted, when the phone is BFU, if the owner has a strong 128 bit password, and the secondary profile has a weaker 6 digit pin, does the attacker need to guess the owner password first before they can guess the others? Or can they just jump straight into cracking the secondary profile?
Someone had assumed I was seeking advice. I am not asking for advice. Extracting weaver keys are very tough, and I do not have a bright red target on my back. Thus, some n-digit pin would suffice. Rather, I am seeking information. (Though some reassurance would be nice)