GrapheneOS Installation Guide: Best Buy to Boot
Last Verified: January 2026
Official Source: https://grapheneos.org/install/web
Status: β
Verified against official documentation
π Table of Contents
- Overview
- Part 1 Device Purchase
- Part 2 System Requirements
- Part 3 Pre-Installation Preparation
- Part 4 Computer Preparation
- Part 5 GrapheneOS Installation Web Installer
- Part 6 Post-Installation Configuration
- Part 7 Troubleshooting
- Part 8 Reverting to Stock Android
Overview
What is GrapheneOS? GrapheneOS is a privacy and security-focused mobile operating system based on the Android Open Source Project (AOSP). It provides substantial hardening over standard Android while maintaining compatibility with Android apps.
Critical Prerequisites - READ FIRST
- β Only Google Pixel devices are officially supported
- β MUST purchase UNLOCKED variant (not carrier-locked)
- β οΈ Requires temporary internet connection for initial OEM unlock check
- π₯ Installation process WILL ERASE ALL DEVICE DATA
- π± Unlocking bootloader may void manufacturer warranty
Why This Guide? This guide follows Occam's Razor: start with the simplest method (web installer) and provides the complete chain from cash purchase to working installation. All steps verified against official GrapheneOS documentation as of January 2026.
Part 1: Device Purchase
π― Recommended Devices (January 2026)
Tier 1 - Best Long-term Support 7 years minimum support + hardware memory tagging (ARMv9)
- Pixel 9 / 9 Pro / 9 Pro XL / 9 Pro Fold
- Pixel 10 / 10 Pro / 10 Pro XL (experimental support)
- Pixel 8 / 8a / 8 Pro
Tier 2 - Good Support 5 years minimum support
- Pixel 7 / 7a / 7 Pro
- Pixel 6 / 6a / 6 Pro
Not Recommended Extended support only - approaching end-of-life
- Pixel 5a and earlier models
- These receive minimal updates and will lose support soon
πͺ Purchase at Best Buy
CRITICAL: Purchase "Unlocked" Variant Only This is the single most important decision in this entire process.
Carrier-locked devices have a permanent restriction that CANNOT be removed, even after:
- Paying off the device in full
- Completing contract terms
- Requesting carrier unlock
The OEM unlock will be permanently disabled.
Step-by-Step Purchase Process
1. Locate Unlocked Pixel Devices:
In-store location: Mobile phone section
Look for: Devices with "Unlocked" or "Unlocked for All Carriers" label
Verify: Packaging shows "Unlocked" designation (not carrier logo)
What to Ask Best Buy Associate "I need an unlocked Google Pixel [model], not a carrier-specific version. Can you verify this is the unlocked variant that works with all carriers?"
2. Payment Method:
- β Cash accepted at register
- β Request receipt (needed for warranty)
- β No account/phone number required for cash
- β No personal information collection
3. What to Avoid:
Red Flags - DO NOT PURCHASE
- β ANY carrier branding on box (Verizon, AT&T, T-Mobile, etc.)
- β Devices labeled βActivate Todayβ with carrier logos
- β βLocked to [Carrier]β anywhere on packaging
- β Contract/installment plan offerings (even paying full price)
- β Employee saying βwe can unlock it laterβ (they cannot)
π Why Unlocked Matters (Technical Explanation)
Technical Details Carrier variants have a carrier ID permanently flashed to the
persistpartition during manufacturing. This carrier ID:
- Activates carrier-specific configuration in stock Android OS
- Disables OEM unlocking capability at hardware level
- Disables bootloader unlocking capability
- Cannot be removed through software
- Persists even after factory reset
- Blocks GrapheneOS installation permanently
Unlocked variants have carrier ID set to zero, allowing full control.
Verification Before Leaving Store If possible, ask to verify the device before purchase:
- Open box and boot device
- Complete minimal setup
- Check Settings β Developer Options β βOEM unlockingβ
- If greyed out permanently = carrier locked
- Return immediately if locked
Part 2: System Requirements
π» Computer Requirements
Hardware Requirements
- RAM: Minimum 2GB free
- Storage: Minimum 32GB free space
- USB Port: USB-C preferred, USB-A acceptable with quality cable
- Connection: Direct port (no hubs)
Supported Operating Systems
Officially Supported
- β Windows 10 / 11
- β macOS (recent versions)
- β Linux (most distributions)
- β ChromeOS
- β Android tablets (web installer only)
Not Recommended
- β Virtual Machines (USB passthrough unreliable)
- β USB hubs (use direct rear/laptop ports only)
- β Incognito/private browsing mode (causes connection issues)
- β Outdated OS versions (update before proceeding)
Supported Browsers (Web Installer)
β
Google Chrome (recommended)
β
Microsoft Edge
β
Chromium
β
Brave
β
Vanadium (on GrapheneOS/ChromeOS)
π¦ Required Items Checklist
Before Starting Installation
- Compatible Google Pixel device (unlocked)
- High-quality USB-C to USB-C cable (or USB-C to USB-A)
- Computer meeting above requirements
- Internet connection (for computer AND initial phone setup)
- 30-60 minutes of uninterrupted time
- Power outlet (keep devices charged)
Cable Quality Matters Poor quality cables are the #1 cause of installation failures.
Use:
- β Cable that came with Pixel (best option)
- β High-quality certified USB-C cable
- β Cable rated for data transfer (not just charging)
Avoid:
- β Cheap/unknown brand cables
- β Damaged/frayed cables
- β Charge-only cables
Part 3: Pre-Installation Preparation
STOP - Read This First You are about to temporarily boot stock Android and connect to the internet. This seems contradictory for a privacy-focused installation, but it's required by Google's security mechanism.
Why required: Google prevents stolen/financed phones from being unlocked. The device must βphone homeβ once to verify itβs not carrier-locked.
Privacy impact: Minimal - youβll immediately erase and replace the OS. Minimize data shared during this setup.
Step 1: Initial Device Boot (ONE TIME ONLY)
This Step Requires Internet Even though you're installing privacy-focused software, you MUST connect to internet once. This cannot be avoided.
Minimal Setup Process:
1. Power on new Pixel device
2. Select language
3. Connect to Wi-Fi (REQUIRED - cannot skip)
4. Skip/decline all optional services:
β Skip Google account sign-in
β Decline Google services
β Decline location services
β Skip backup/restore
β Decline app installations
5. Complete ONLY required steps to reach home screen
Privacy During Setup
- Use fake name if prompted
- Skip all optional data sharing
- Donβt sign into Google account
- Donβt install apps
- Donβt enter personal information
- Youβll erase all this in 10 minutes anyway
Step 2: Enable Developer Options
Enabling Developer Mode
Settings β About phone β Tap "Build number" 7 timesExpected result: Toast message appears: βYou are now a developer!β
Why This Works This is an intentional Easter egg in Android. Tapping the build number 7 times unlocks developer settings used by app developers and power users.
Step 3: Enable OEM Unlocking
Critical Step - OEM Unlocking
Settings β System β Developer options β Toggle "OEM unlocking" ON
If "OEM unlocking" is Greyed Out This indicates a problem. Possible causes:
- No internet connection (Temporary)
- β Connect to Wi-Fi
- β Wait 5-10 minutes
- β Reboot and check again
- Server check delay (Temporary)
- β Wait up to 24 hours with internet connected
- β Keep Wi-Fi enabled
- β Check periodically
- Carrier-locked device (PERMANENT - Cannot be fixed)
- β Device was sold by carrier
- β OEM unlock permanently disabled
- β MUST RETURN DEVICE
- β Purchase unlocked variant instead
- Pixel 6a specific issue (See below)
Special Case: Pixel 6a Factory Firmware If you have a brand new Pixel 6a straight from factory:
Problem: OEM unlocking wonβt work with factory firmware
Solution:
- Update to June 2022 release or later (OTA update)
- Settings β System β System update β Check for update
- Install all available updates
- Factory reset device (required after update)
- Settings β System β Reset options β Erase all data
- Complete setup again
- Enable Developer Options again
- NOW enable OEM unlocking
Step 4: Update Stock OS (Recommended)
Update Before Installing
Settings β System β System update β Check for update
Why update?
- β Latest firmware for installation process
- β Better USB connection stability
- β GrapheneOS will flash latest firmware anyway
- β Reduces potential compatibility issues
Update Process
- Check for updates
- Download all available updates
- Install updates (device will reboot)
- Repeat until βSystem is up to dateβ
- Reboot device one final time
Part 4: Computer Preparation
Platform-Specific Driver Installation Different operating systems require different driver setups for fastboot communication.
πͺ Windows 10/11
Windows Driver Installation
Method 1: Windows Update (Recommended)
-
Boot Pixel into bootloader mode (see Part 5, Step 1)
-
Connect device to PC via USB
-
Open Windows Update:
Settings β Windows Update -
Click βCheck for updatesβ
-
Click βView optional updatesβ
-
Look for: βLeMobile Android Deviceβ
- (This is the Android bootloader driver - name is due to USB ID overlap)
-
Install the driver
-
Wait for installation to complete
-
Device should now be recognized
Method 2: Manual Driver Installation (Alternative)
- Download latest Pixel USB drivers from Google
- Open Device Manager (
Win + Xβ Device Manager) - Find device with yellow warning icon
- Right-click β Update driver
- Browse to downloaded driver location
- Install driver
Driver Issues If device not recognized:
- Try different USB port (rear ports on desktop)
- Disable USB 3.0 in BIOS (use USB 2.0 port)
- Try different cable
- Restart computer
- Uninstall and reinstall driver
π§ Linux (Debian/Ubuntu)
Debian/Ubuntu Setup
Install required package:
sudo apt update
sudo apt install android-sdk-platform-tools-commonVerify installation:
fastboot --versionudev Rules The
android-sdk-platform-tools-commonpackage includes udev rules allowing non-root USB access to Android devices.If you installed fastboot differently, you may need to manually add udev rules.
π§ Linux (Arch)
Arch Linux Setup
Install required package:
sudo pacman -S android-udevReload udev rules:
sudo udevadm control --reload-rules
sudo udevadm triggerπ macOS
macOS - No Additional Setup Required macOS includes native support for Android fastboot devices.
Requirements:
- β Keep system updated
- β May need to allow USB connection in System Preferences
- β Use high-quality cable
macOS USB Permission When device connects, macOS may ask to trust the device. Click "Trust" if prompted.
Part 5: GrapheneOS Installation (Web Installer)
Web Installer Overview The web installer uses WebUSB technology to communicate directly with your device through the browser. It's the easiest and recommended method for most users.
Estimated time: 15-30 minutes
Step 1: Boot into Bootloader Mode
Entering Fastboot Mode
Process:
-
Power off device completely
- Hold power button
- Tap βPower offβ
- Wait for complete shutdown
-
Enter bootloader:
- Press and hold: Volume Down + Power Button
- Hold BOTH buttons simultaneously
- Keep holding for ~3-5 seconds
-
Expected result:
- Screen shows βFastboot Modeβ text
- Red triangle with Android logo
- Device model and variant info
- Serial number
-
Release buttons
Visual Confirmation You should see a screen that looks like this:
ββββββββββββββββββ β οΈ / \ / \ ββββββββ FASTBOOT MODE PRODUCT_NAME - [model] VARIANT - [variant] SERIAL NUMBER - [serial] ββββββββββββββββββ
Step 2: Connect Device to Computer
USB Connection
Process:
- Use high-quality USB-C cable
- Connect Pixel to computer
- Connect directly to rear port (desktops) or main port (laptops)
- Avoid USB hubs
Expected behavior:
- Windows: Device should be recognized (driver installed in Part 4)
- macOS: Device recognized automatically
- Linux: udev rules allow access (installed in Part 4)
Connection Troubleshooting Device not recognized?
Try in order:
- Different USB port (rear ports preferred on desktop)
- Different USB cable
- Restart computer
- Verify driver installation (Windows)
- Verify udev rules (Linux)
- Try USB 2.0 port instead of 3.0
- Disable USB selective suspend (Windows)
Step 3: Access Web Installer
Official Web Installer Open browser and navigate to:
https://grapheneos.org/install/web
Security Notice ONLY use the official installer at
grapheneos.orgβ Do NOT use:
- Third-party installation guides
- Unofficial tools
- Modified installers
- YouTube tutorial tools
β Verify URL is exactly:
https://grapheneos.org/install/web
Expected behavior:
- Webpage loads
- Browser detects device in fastboot mode
- Interface shows device detected
- βUnlock bootloaderβ button becomes active
If Device Not Detected
- Ensure device is in fastboot mode (see Step 1)
- Try different browser (Chrome/Edge recommended)
- Disable browser extensions temporarily
- Donβt use incognito/private mode
- Refresh the page
- Check USB connection
Step 4: Unlock Bootloader
WARNING - Data Will Be Erased Unlocking the bootloader will ERASE ALL DATA on the device.
This includes:
- All apps
- All settings
- All files
- All accounts
- Everything
This is a security feature and cannot be avoided.
Process:
-
On webpage: Click βUnlock bootloaderβ button
-
On Pixel device:
- Screen shows unlocking warning
- Use Volume buttons to navigate
- Select βUnlock the bootloaderβ option
- Press Power button to confirm
-
Device displays warning:
If you unlock the bootloader, you will be able to install custom operating system software on this phone. A custom OS is not subject to the same testing as the original OS, and can cause your phone and installed applications to stop working properly. To prevent unauthorized access to your personal data, unlocking the bootloader will also delete all personal data from your phone (a "factory data reset"). -
Confirm unlocking
Expected result:
- Device erases all data
- Bootloader unlocks
- Device remains in fastboot mode
- Web interface confirms unlock
Bootloader Now Unlocked The bootloader is now unlocked. This allows installation of custom operating systems like GrapheneOS.
Step 5: Download GrapheneOS
Downloading Factory Images
Process:
-
On webpage: Click βDownload releaseβ button
-
Select your specific Pixel model from dropdown:
Example: "Pixel 9 Pro (comet)" -
Download begins automatically
File size: Varies by device, typically 1-2GB
Download time: Depends on internet speed (5-15 minutes typical)
Verify Download
- Monitor download progress
- Ensure download completes fully
- Check browser downloads folder if needed
- Donβt proceed until download is 100% complete
What's Being Downloaded? The factory image contains:
- GrapheneOS system image
- Bootloader firmware
- Radio firmware
- Boot image
- Vendor image
- All necessary partitions
Step 6: Flash GrapheneOS
Critical Step - Flashing OS
Process:
-
On webpage: Click βFlash releaseβ button
-
Web installer begins flashing process:
Progress stages: βββ Erasing partitions βββ Writing bootloader βββ Writing radio firmware βββ Writing system partitions βββ Writing boot image βββ Writing vendor image βββ Verifying written data -
DO NOT DISCONNECT DEVICE
Duration: 5-15 minutes (varies by device)
Critical Warnings During Flash
- β DO NOT disconnect USB cable
- β DO NOT close browser
- β DO NOT power off device
- β DO NOT interrupt the process
- β DO NOT touch device buttons
Interrupting flash can brick your device.
Monitor progress:
- Web interface shows progress bar
- Device screen shows flash activity
- Status messages update in real-time
Flash Complete When flashing completes:
- Web interface shows βFlash completeβ
- Device remains in fastboot mode
- Ready for next step (locking bootloader)
Step 7: Lock Bootloader (CRITICAL FOR SECURITY)
CRITICAL - Do Not Skip This Step Locking the bootloader is ESSENTIAL for security.
Without a locked bootloader:
- β Verified boot doesnβt work
- β Anyone with physical access can modify OS
- β Device is vulnerable to evil maid attacks
- β GrapheneOS security features degraded
YOU MUST LOCK THE BOOTLOADER.
Process:
-
On webpage: Click βLock bootloaderβ button
-
On Pixel device:
- Use Volume buttons to navigate
- Select βLock the bootloaderβ
- Press Power button to confirm
-
Device locks bootloader
Expected result:
- Bootloader locked
- Verified boot enabled
- Device remains in fastboot mode
- Web interface confirms lock
Bootloader Locked β Bootloader is now locked β Verified boot active β GrapheneOS cannot be tampered with β Full security model in effect
Step 8: Reboot and Complete Installation
Final Reboot
Process:
-
Device automatically reboots (or manually reboot from fastboot menu)
-
First boot sequence:
- GrapheneOS boot animation appears
- First boot takes 2-5 minutes (longer than normal boots)
- Device initializes all partitions
- Sets up encrypted storage
-
Setup wizard appears:
- GrapheneOS welcome screen
- Language selection
- Timezone configuration
- Security setup
Installation Complete! π Congratulations! GrapheneOS is now installed.
Your device is running a privacy and security-focused operating system with:
- β Hardened security model
- β Verified boot protection
- β No Google services by default
- β Enhanced app sandboxing
- β Privacy-focused defaults
Part 6: Post-Installation Configuration
Securing Your Installation While GrapheneOS is installed, you should complete these critical post-installation steps to maximize security.
Step 1: Disable OEM Unlocking (CRITICAL)
IMPORTANT FOR SECURITY You MUST disable OEM unlocking after installation.
Why this matters:
- Prevents unauthorized bootloader unlocking if device stolen
- Completes the security model
- Required for full verified boot protection
- Standard security practice
Process:
Settings β System β Developer options β Toggle "OEM unlocking" OFF
Security Checkpoint After disabling OEM unlocking:
- β Bootloader cannot be unlocked without factory reset
- β Thief cannot install malicious OS
- β Data protected even if device stolen
- β Full hardware-backed security active
Step 2: Initial Setup Wizard
Configure Basic Settings
Complete these steps:
-
Select Language
- Choose your preferred language
-
Set Timezone
- Select your timezone
- Enable/disable automatic timezone
-
Create Device PIN/Password
Required security feature Minimum 6 digits recommended Stronger = better (passphrase recommended) -
Configure Lockscreen
- Set lock timeout
- Configure PIN scrambling (optional but recommended)
- Set up fingerprint (optional)
-
Skip Google Account (unless needed)
- You can add sandboxed Google Play later if needed
- GrapheneOS doesnβt require Google account
PIN Scrambling GrapheneOS offers PIN scrambling:
- Randomizes number pad layout on lockscreen
- Prevents shoulder surfing
- Hardens against observation attacks
Enable in: Settings β Security β PIN scrambling
Duress Password GrapheneOS supports a "duress password":
- Special PIN/password that wipes device when entered
- Use if forced to unlock under duress
- Configure in: Settings β Security β Duress password
Step 3: Verify Installation
Verify Authenticity
Method 1: Check Build Number
Settings β About phone β Build number
Should show:
Format: 2025XXXXXX (date-based build number)
Example: 2025121701
Followed by: Device codename
Valid Build Number If you see a GrapheneOS build number with recent date, installation is correct.
Method 2: Use Auditor App (Recommended)
Cryptographic Verification
The Auditor app provides cryptographic proof your installation is genuine:
- Open preinstalled βAppsβ application
- Find βAuditorβ
- Tap βInstallβ
- Open Auditor app
- Follow attestation instructions
- App verifies:
- β GrapheneOS authenticity
- β Bootloader lock status
- β Verified boot state
- β No tampering occurred
Auditor Details Auditor uses Android's hardware attestation:
- Cryptographic signatures from Titan M chip
- Verifies entire boot chain
- Confirms OS integrity
- Cannot be spoofed
Step 4: Install Sandboxed Google Play (Optional)
Do You Need Google Play?
Install if you need:
- Banking apps
- Apps requiring Google Play Services
- Apps requiring SafetyNet/Play Integrity
- Google Play Store access
Skip if:
- Using only F-Droid apps
- Using Aurora Store for Play Store apps
- Donβt need Google services
- Want maximum privacy
Installation Process
If needed:
-
Open preinstalled βAppsβ application
-
Find and install (in order):
1. Google Play Services 2. Google Services Framework 3. Google Play Store -
Tap βInstallβ on each
-
Wait for installation to complete
Sandboxed Google Play GrapheneOS runs Google Play Services in a sandbox:
- β No system privileges (runs as user app)
- β No special access to system
- β Fully permission-controlled by you
- β Can be uninstalled anytime
- β Network/sensors gated per-app
This is fundamentally different from stock Android where Google Play has system-level privileges.
Per-Profile Installation You can install sandboxed Google Play in:
- Main profile (all apps access)
- Specific user profiles only
- Work profile only
This compartmentalizes Google services.
Step 5: Configure Privacy & Security Settings
Recommended Hardening
Privacy Settings:
Settings β Privacy:
βββ Location
β βββ Disable when not needed (per-app control)
βββ Camera
β βββ Review app permissions
βββ Microphone
β βββ Review app permissions
βββ Sensors
βββ Configure per-app sensor access
Security Settings:
Essential Security Features
Auto-Reboot:
Settings β Security β Auto reboot
Recommended: 12-24 hours
Why this matters:
- Rebooting locks device into BFU (Before First Unlock) state
- Encryption keys not in memory
- Harder to extract data
- Protects against forensic tools
Network Permission:
Settings β Apps β [App] β Network permission
- GrapheneOS allows blocking internet per-app
- Apps function offline but canβt send data
Sensors Permission:
Settings β Apps β [App] β Sensors permission
- Block access to accelerometer, gyroscope, etc.
- Prevents motion-based fingerprinting
- Hardens privacy
Storage & Contact Scopes
GrapheneOS introduces granular controls:
Storage Scopes:
Settings β Apps β [App] β Storage Scopes
- Select specific files/folders app can access
- App doesnβt see entire storage
- Prevents data harvesting
Contact Scopes:
Settings β Apps β [App] β Contact Scopes
- Select specific contacts app can access
- App doesnβt see full contact list
- Protects contact privacy
Use Case Messaging app only needs access to contacts you message, not your entire address book. Grant access to specific contacts only.
Step 6: Additional Hardening (Advanced)
Advanced Options
Exploit Protection:
Settings β Security β Exploit protection
βββ Enable hardened malloc (on by default)
Network Features:
Settings β Network & internet:
βββ Wi-Fi Privacy
β βββ Randomize MAC per network (enabled by default)
βββ Private DNS
β βββ Configure DNS-over-TLS
βββ VPN
βββ Configure always-on VPN (optional)
Automatic Features:
Settings β Security:
βββ Auto reboot (configure timer)
βββ Auto Wi-Fi disable (when not used)
βββ Auto Bluetooth disable (when not used)
βββ USB-C port disable (lockscreen option)
Complete Hardening With these settings configured:
- β Maximum privacy protection
- β Reduced attack surface
- β Granular app control
- β Automatic security measures
- β Full control over device
Part 7: Troubleshooting
Common Issues & Solutions
Issue 1: βOEM Unlockingβ Greyed Out
Diagnosis Tree
"OEM unlocking" toggle is greyed out
β
ββ Device has internet connection?
β ββ NO β Connect to Wi-Fi, wait 10 minutes, check again
β ββ YES β Continue
β
ββ Waited 24+ hours with internet?
β ββ NO β Wait longer, Google server may be delayed
β ββ YES β Continue
β
ββ Pixel 6a with factory firmware?
β ββ YES β Update to June 2022+, factory reset, try again
β ββ NO β Continue
β
ββ Still greyed out after all above?
ββ Device is CARRIER LOCKED (permanent)
ββ MUST RETURN and purchase unlocked variant
Resolution Steps:
Try These in Order
1. Internet Connection:
- Connect to Wi-Fi
- Verify internet works (test in browser)
- Reboot device
- Check OEM unlocking again
- Wait 10-15 minutes
2. Server Delay:
- Keep device connected to internet
- Wait up to 24 hours
- Check periodically
- Google servers may be slow to respond
3. Pixel 6a Specific:
Settings β System β System update β Check for update
Install ALL updates
Factory reset device
Setup again
Enable Developer Options
Try OEM unlocking
4. Carrier Lock (Unfixable):
If Still Greyed After All Above Device is carrier-locked. This CANNOT be fixed.
Actions:
- β Return device to Best Buy immediately
- β Purchase UNLOCKED variant
- β Verify unlocked label on new device
- β Test OEM unlocking before leaving store
Issue 2: Device Not Detected in Fastboot
Connection Issues
Symptoms:
- Web installer doesnβt detect device
- βNo device detectedβ message
- Device in fastboot but computer doesnβt see it
Resolution:
Systematic Troubleshooting
1. Verify Fastboot Mode:
Device screen should show:
"FASTBOOT MODE"
Not: "Start" or normal Android
2. Cable/Port Issues:
- Try different USB port (rear ports on desktop)
- Try different USB cable (use Pixelβs original cable)
- Avoid USB hubs completely
- Connect directly to motherboard port
3. Driver Issues (Windows):
Device Manager β Other devices
Look for: Device with yellow warning icon
Solution:
Windows Update β View optional updates
Install: "LeMobile Android Device"
4. udev Rules (Linux):
# Verify package installed
dpkg -l | grep android-sdk-platform-tools-common
# If not installed:
sudo apt install android-sdk-platform-tools-common
# Reload udev
sudo udevadm control --reload-rules
sudo udevadm trigger5. USB Port Type:
- Try USB 2.0 port instead of 3.0
- Some USB 3.0 ports have compatibility issues
- Rear ports more reliable than front panels
Issue 3: Web Installer Not Detecting Device
Browser/Connection Issues
Symptoms:
- Device in fastboot
- Computer sees device
- Web installer shows βNo device detectedβ
Resolution:
Browser-Specific Fixes
1. Browser Issues:
- Try different browser (Chrome/Edge recommended)
- Clear browser cache
- Disable ALL browser extensions
- Donβt use incognito/private mode
- Update browser to latest version
2. Page Issues:
- Hard refresh page (Ctrl+F5 / Cmd+Shift+R)
- Close and reopen browser completely
- Navigate directly to URL (donβt use bookmark)
- Check URL is exactly:
https://grapheneos.org/install/web
3. WebUSB Permissions:
- Browser may ask to connect to device
- Click βAllowβ or βConnectβ
- Check browser site permissions
- Ensure WebUSB not blocked
4. Computer Issues:
- Restart computer
- Try different computer if available
- Update OS to latest version
Issue 4: Flash Process Fails/Errors
Flashing Errors
Symptoms:
- Flash starts but fails partway through
- Error messages during flash
- Flash hangs/freezes
- βFAILEDβ messages
Resolution:
Comprehensive Fix Process
1. Storage Space:
Verify computer has:
ββ 32GB+ free storage
ββ 2GB+ free RAM
Check:
Windows: This PC β C: drive properties
macOS: About This Mac β Storage
Linux: df -h
2. Power/Connection:
- Ensure device has >50% battery
- Keep device connected to power during flash
- Donβt move/disturb USB cable during flash
- Ensure stable USB connection
3. Clean Retry:
- Completely close browser
- Disconnect device
- Reboot device to fastboot mode
- Reboot computer
- Start process fresh from Step 1
4. Alternative Cable/Port:
- Use different USB cable
- Use different USB port
- Try USB 2.0 port if using 3.0
- Avoid extension cables/adapters
5. Download Issues:
- Re-download factory image
- Verify download completed fully
- Check file size matches expected
- Clear browser download cache
6. Last Resort:
- Try different computer
- Try command-line installation method
- Ask for help in GrapheneOS chat
Issue 5: Boot Loop After Installation
Device Won't Boot Properly
Symptoms:
- Device reboots repeatedly
- Stuck on boot animation
- Never reaches setup wizard
- Continuous restart
Resolution:
Boot Issues Fix
1. Verify Bootloader Lock:
Boot to fastboot mode:
Volume Down + Power
Check screen shows:
"LOCK STATE: locked"
If shows "unlocked":
ββ Use web installer β Lock bootloader again
2. Force Relock:
- Boot to fastboot mode
- Connect to web installer
- Click βLock bootloaderβ
- Confirm lock
- Reboot
3. Reflash OS:
- Boot to fastboot mode
- Unlock bootloader
- Flash GrapheneOS again (full process)
- Lock bootloader
- Reboot
4. Verify Correct Image:
- Ensure you selected correct device model
- Pixel 9 Pro β Pixel 9
- Each model has specific image
- Re-download if unsure
Issue 6: Specific App Compatibility
Apps Not Working
Symptoms:
- Banking app wonβt open
- βDevice not certifiedβ errors
- Apps detecting βrootedβ device
- SafetyNet/Play Integrity failures
Resolution:
App Compatibility Fixes
1. Install Sandboxed Google Play:
Apps β Install:
ββ Google Play Services
ββ Google Services Framework
ββ Google Play Store
2. Play Integrity:
Current Status
- Basic integrity: Usually passes
- Device integrity: May fail on some apps
- Strong integrity: Usually fails
GrapheneOS team working on compatibility layer
3. Banking Apps:
- Install sandboxed Google Play first
- Update all Google Play components
- Clear app cache/data
- Reinstall app
- Some banks permanently block custom ROMs
4. Workarounds:
- Use web version of app/service
- Contact app developer (some whitelist GrapheneOS)
- Use alternative apps
- Accept some apps wonβt work
Part 8: Reverting to Stock Android
Returning to Stock OS
If you need to return to stock Google Android (e.g., for warranty, resale, or personal preference):
Reversion Process
Step-by-Step Reversion
Step 1: Remove Non-Stock Key
- Navigate to: https://grapheneos.org/install/web
- Scroll to bottom of page
- Boot device to fastboot mode
- Connect to computer
- Click βRemove the non-stock keyβ button
- Follow prompts
Step 2: Flash Stock Firmware
- Navigate to: https://flash.android.com
- Connect device (should be in fastboot)
- Select your Pixel model
- Choose firmware version:
- Latest stable
- Or specific version
- Click βInstallβ
- Wait for flash to complete
Step 3: Lock Bootloader
- Still at flash.android.com
- Follow prompts to lock bootloader
- Confirm lock
- Device will reboot to stock Android
Reverted Successfully Device is now running stock Google Android:
- β Factory firmware restored
- β Bootloader locked
- β All GrapheneOS removed
- β Google services active
- β Ready for normal use/resale
Why Revert? Common reasons:
- Warranty claim requiring stock OS
- Selling/trading device
- App compatibility issues
- Preference for stock Android
- Testing/comparison
Part 9: Key Security Reminders
Post-Installation Security Checklist
Critical Security Items
Verify These Are Complete
-
OEM unlocking is DISABLED
Settings β System β Developer options β OEM unlocking: OFF -
Bootloader is LOCKED
Check in fastboot mode: LOCK STATE: locked -
Auto-reboot enabled
Settings β Security β Auto reboot: 12-24 hours -
Strong PIN/password set
6+ digits minimum, passphrase recommended -
App permissions reviewed
Settings β Privacy β Permission manager -
Installation verified
Use Auditor app for cryptographic verification -
Storage/Contact Scopes configured
Granular access for sensitive apps
Understanding Security Model
GrapheneOS Security Architecture
Hardware-Backed Security:
Titan M Chip (Secure Element)
ββ Stores encryption keys
ββ Verifies boot chain
ββ Hardware attestation
ββ Rollback protection
Verified Boot:
Boot Chain Verification
ββ Bootloader verified by Titan M
ββ OS verified by bootloader
ββ Apps verified by OS
ββ Cryptographic signatures at each level
Sandboxing:
App Sandbox (Hardened)
ββ Stronger than stock Android
ββ Hardware memory tagging (ARMv9)
ββ Hardened malloc
ββ Exploit mitigations
Full Security Active With bootloader locked and OEM unlocking disabled:
- β Verified boot protecting boot chain
- β Titan M chip validating signatures
- β Encryption keys hardware-protected
- β Rollback attacks prevented
- β Evil maid attacks mitigated
- β Full GrapheneOS security model active
Part 10: Additional Resources
Official Documentation
Primary Resources
Official GrapheneOS Sites:
- Main site: https://grapheneos.org
- Installation guide: https://grapheneos.org/install/web
- Usage guide: https://grapheneos.org/usage
- FAQ: https://grapheneos.org/faq
- Features: https://grapheneos.org/features
Community Resources:
- Matrix chat: Linked on grapheneos.org
- Reddit: r/GrapheneOS
- Forum: discuss.grapheneos.org
Device-Specific Information
Supported Devices Details
Current Support (January 2026):
| Device | Support Status | End of Support | Notes |
|---|---|---|---|
| Pixel 10 Series | Experimental | 2032+ | 7-year minimum |
| Pixel 9 Series | Stable | 2031+ | 7-year minimum, ARMv9 |
| Pixel 8 Series | Stable | 2030+ | 7-year minimum, ARMv9 |
| Pixel 7 Series | Stable | 2027+ | 5-year minimum |
| Pixel 6 Series | Stable | 2026+ | 5-year minimum |
| Pixel 5a | Extended | 2026 | End-of-life soon |
Key Device Features:
ARMv9 Benefits (Pixel 8/9/10)
- Hardware memory tagging (MTE)
- Enhanced exploit protection
- Better performance
- Longer support commitment
Getting Help
Support Channels
Before Asking for Help:
- Read this entire guide
- Check official documentation
- Verify device is unlocked variant
- Ensure computer meets requirements
- Try troubleshooting steps above
Where to Get Help:
Official Channels:
- Matrix chat (fastest response)
- discuss.grapheneos.org
- GitHub issues (bugs only)
Community Channels:
- r/GrapheneOS
- XDA forums (community, not official)
When Asking:
Provide This Information
- Device model (exact variant)
- Computer OS and version
- Browser used
- Specific error messages (exact text)
- What youβve already tried
- Screenshots if relevant
Appendix: Quick Reference
Essential Commands & Settings
Quick Settings Paths
OEM Unlocking:
Settings β System β Developer options β OEM unlocking
Auto Reboot:
Settings β Security β Auto reboot
App Permissions:
Settings β Privacy β Permission manager
Storage Scopes:
Settings β Apps β [App] β Storage Scopes
Network Permission:
Settings β Apps β [App] β Network permission
PIN Scrambling:
Settings β Security β PIN scrambling
Duress Password:
Settings β Security β Duress password
Fastboot Mode Commands
Enter Fastboot:
Volume Down + Power (from power off)
Navigate Menu:
Volume Up/Down = Navigate
Power = Select
Common Options:
- Start (boot normally)
- Restart bootloader
- Recovery mode
- Power off
Emergency Numbers
If Device Bricked
Not Actually Bricked If:
- Device powers on
- Shows fastboot mode
- Computer recognizes in fastboot
- Can reflash OS
Actually Bricked (Rare):
- Device completely dead
- No fastboot mode
- No signs of life
- Hardware failure
Resolution: Contact Google support or phone repair shop
Document Information
Version: 2.0 (Obsidian Edition)
Last Updated: January 4, 2026
Verified Against: GrapheneOS official documentation
Confidence Level: HIGH (all steps verified from primary sources)
Data Sources:
- β grapheneos.org (official documentation)
- β GrapheneOS releases page
- β Installation guides (web installer)
- β Community discussions (verification)
- β Best Buy website (device availability)
Limitations:
- Cannot verify current Best Buy stock levels
- Carrier policies may vary by region
- Some device-specific issues may not be covered
- App compatibility varies
Guide Complete You should now have:
- β Understanding of entire process
- β Knowledge to purchase correct device
- β Ability to install GrapheneOS
- β Post-installation security hardening
- β Troubleshooting capabilities
Stay safe and privacy-conscious!