How is this different from a backdoor in every phone?

Some authority compels me to give them signing keys so now they can push anything they want, to any device they want?

They can't bypass disk encryption that way:

https://news.ycombinator.com/item?id=46038241

It does appear to be what they want from us, but it's not possible to bypass the Weaver disk encryption throttling via compromised OS updates or even secure element updates. It's fully not possible to bypass the security of a strong passphrase, which we encourage via optional 2-factor authentication support for fingerprint+PIN as the main way people unlock to make using a passphrase as the primary lock method after booting or 48h timeout much more convenient.

Just wanted to say: don't listen to people who say you're crass or wrong. GrapheneOS' actions and words are great and a boon.

Well that's really good to know.

Been a happy user of Graphene since the Copperhead days. Thanks for all the work you do. I know you've endured a ton of shit.

Once they've established a rule that you have to help them in all cases, what stops them from forcing you to push an update to a phone while the user still has it, to collect information from the phone while actually unlocked and in use?

[deleted]