https://www.bitdefender.com/blog/hotforsecurity/new-android-lock-screen-bypass-vulnerability-exposed/
https://securityaffairs.com/155588/hacking/android-14-13-lock-screen-bypass.html
There has been a partial lockscreen bypass discovered in android. The bypass allows an attacker to access "sensitive data stored in people’s Google accounts. The bug [...] lets attackers with physical access to a device bypass the lock screen and access personal data, including photos, browsing history, and contacts."
Will this be something grapheneos is immune to due to some hardening im unaware of? Or is this an upstream issue that will require AOSP itself to fix? I don't see any explicit way GOS counters this exploit.
From what I've read, the attack vector of this is limited to only google maps and the scope off access is only peoples data within their google accounts. Im assuming this means the issue is non existent for people without GSF or google maps.
TL,DR; Google maps on lockscreen exploit allows attacker with physical access to look at some of your google account data w/o passcode