Conversation

There are vendors making it a lot easier to build AOSP for their devices than Pixels. It's a misconception that Pixels are the easiest devices to support. Also, the devices moving immediately to the new major release on day one makes it harder, not easier, since you have to move.
2
3
Since they stop publishing factory images and device support code for the previous major release. With your own device, you control your own destiny in that regard. AOSP supports each major release for 3 years and your vendor updates won't require a new major release of Android.
1
2
Without your own device, simply targeting ANYTHING other than a Pixel, since the OEM takes longer to migrate you have a lot more time to port your changes and get your fork of AOSP ready. Treble also allows moving to a new major release without device support code being updated.
1
1
Pixels make this hard, since they move immediately, right when the new OS you need to port your code to becomes publicly available, and they immediately drop support for the previous major release. Treble means AOSP is backwards compatible with device support code, but new device
1
2
support code isn't backwards compatible with an old version of AOSP so we can't simply continue having GrapheneOS based on Android 10 while shipping Android 11 device support code. Forced to migrate rapidly which is extremely difficult. All of this is caused by targeting Pixels.
1
2
Our long-term goal is to be targeting custom hardware in collaboration with organizations like Calyx, where hardware is produced to suit the needs of multiple projects. Would no longer have these issues regardless of how much SoC vendor code is open + can take time to migrate.
2
5
We consider both of those far worse than the current Pixel targets and they don't actually offer us the control that we want over the hardware / firmware. We want to start from a mainstream reference design with a mainstream SoC with competitive security and be the OEM.
1
1
Pixel devices are what causes these problems. If we had our own Qualcomm SoC device largely just using a reference design and using the Qualcomm SPU rather than the Titan M (not quite as good, but good enough), etc. we'd be able to target reaching parity with Pixel security.
2
1
Or another major SoC vendor like Mediatek or whatever, but Qualcomm has the best platform security right now. Regardless of what's chosen, there's mostly closed source firmware, but you actually get a lot of those sources to modify and sign with your keys if you're the OEM.
1