This assumes everything works fine. It's probably an edge case, but on my Nexus 6P an update somehow messed with my encryption keys, and the screen lock pattern that I'd used for over a year stopped getting recognised. I can't remember the solution but I vaguely remember having to factory reset. Whatever the solution was, it wasn't too different to what a thief would do... I was bypassing the screen lock after all.
Okay, according to the article, this functionality will only activate after you have signed into a Google account for the first time on the device. So, at least for those of us who use custom software such as lineage OS, that won't matter since we don't put a Google account on the device to begin with in a lot of cases. A lot of us boot the phone for the first time, skip the entire setup wizard as fast as possible without signing in or any of that stuff, and then immediately enable OEM unlocking and flash the lineage or whatever software.
Well, that won't matter unless it's a brand new phone or has been properly erased because you won't be able to install lineage anyway unless one of those two conditions are met.
I think the reason this hasn’t been done yet is because their implementation comes with benefits like portability and low maintenance when the feature is implemented in just one app and just one part of the code. I think they hoped that patching bypasses in one app is viable and would eventually close most of the holes, but it turned out not to be so simple because bypasses emerged time and time again even with very limited initial access.
You’re not supposed to be able to skip running the wizard. A stolen phone was unusable and effectively had all of these features, but with a single point of failure that has turned out to be more of a problem then the maintenance benefit is worth.
I think you would be fine. You’re only restricted if you log into the vanilla ROM, do some stuff, and later if you want to use the vanilla ROM again you’ll be required to login to the account you used last on the vanilla ROM to make it happy with the device.
I don’t expect custom ROMs will have any compatibility with this feature. I believe they would bypass it entirely.
True! But it still hurts the resale value because users are likely to notice a device with broken secure boot if you were to somehow use it to forcefully flash a modified ROM.
Are you proposing this mode could be used to somehow clear the secret data?
My understanding is EDL mode can refuse to flash some partitions and some devices will not enter this mode if fastboot is working, which also enforces preventing access to some partitions. Most people who use EDL already unlocked the bootloader, but I don’t think this method works on all devices if the boot loader is still locked.
This could still be bypassed by flashing a new OS that deliberately messes up the userdata wipe-persisting secrets. Well idk if there's a way to prevent that, but I guess really needy and tech-savvy people could recover lost devices that way
Is the bootloader unlocking requirement that FRP is not triggered a hard one or just because the settings screen isn't (or shouldn't) be reachable? Now that OEM unlocking and FRP aren't tied together anymore, it doesn't seem like a hard one