What is somewhat more concerning is that depending on the particular Android version and OEM customizations there are various way how to get into this browser or even complete Android Setting screen from the on boarding flow. Most FRP-bypass exploits involving only user manipulation of the device are built on something like that.