- I don’t know, but according to this page, it seems there is some kind of profile support. I assume it’s part of the Android Open Source Project.
- (Good thing I noticed that you edited your comment to insert this question.) I am not aware of an effective Google Play sandbox from any OS other than GrapheneOS. It doesn’t affect me either way, since I don’t use Google services.
- Storage encryption is built in to Android these days. I don’t remember whether the latest version does it with file-based encryption or full-device encryption. (Both have been used in the past.)
- It depends on who your adversary is. For example, a Google employee or a government might have remote access to a back door planted in a Pixel, but not to your boot loader. On the other hand, a TSA employee might be able to pwn your phone if granted physical access, but unable to do anything remotely. Pixels are generally more resistant to to physical access attacks because they allow user-supplied keys and boot loader re-locking, but there are companies that sell tools aiming to bypass even these protections, so I wouldn’t bet my life on them.
That depends on the device, not the OS.