As many unofficial devices (and several officially supported devices) do not support re-locking the bootloader, I have tried different responses and iterations on how to explain the real-life risk to users if their device has an unlocked bootloader.
I am looking for some feedback on my latest attempt at an explanation. If you can help me focus the wording of it then we can us it as a somewhat “standard response” when people raise question or concern on the risk they face when using a device with an unlocked bootloader:
Note on the bootloader being unlocked: As with all modern Android systems, your data is encrypted and safe unless your unlock pattern / pin is compromised, which is the same regardless of having a locked or unlocked bootloader.
The theoretical risk of an unlocked bootloader is that if some malicious and technically advanced entity gains physical access to the device then you can’t be certain if they possibly tampered with the system in your absence. In that case, if you feel your device may have been compromised, after you regain control of it you should reset the device from System Recovery before booting to ensure any malicious process doesn’t steal your data after you unlock it with your pattern / pin.
To be clear, without physical access, it is not proven, as far as I am aware, that an unlocked bootloader poses greater threat to your data being compromised than a locked bootloader. Even if an entity gains physical access to your device your data is only at risk after you directly unlock it after it is returned to you.
Possibly the last 2 paragraphs could be consolidated, but I wanted to really make that point explicitly clear. Other thoughts?