Google restricts Android sideloading

Framing and terminology

  • Several comments object to the word “sideloading,” arguing it normalizes the idea that installing your own software is unusual; they prefer calling it simply “installing apps on your own device.”
  • Others think language-policing is a distraction from more practical issues, though there’s broad agreement that framing matters in public and regulatory debates.

What Google changed (scope and mechanics)

  • Change is currently a pilot in Singapore only, targeting:
    • Apps requesting high‑risk permissions (SMS, notifications, accessibility).
    • Installs from “internet-sideloading sources”: browsers, messaging apps, file managers.
  • F‑Droid and other app stores appear unaffected if they set installer metadata correctly; ADB installs still work; Play Protect can usually be disabled, with some constraints (e.g. not while on a call).
  • Many note that technically savvy users still have multiple paths; the friction is mainly for average users.

Security vs. autonomy and competition

  • One camp sees this as a reasonable anti‑fraud measure: Singapore has large losses from Android malware scams, mostly via sideloaded apps; banks are already locking accounts when “unverified apps” are present.
  • Others see it as “boiling the frog”: each increase in friction for non‑Play installs nudges users and developers into Google’s walled garden, reinforcing Play Store lock‑in and enabling APIs (Play Integrity) that disadvantage alternative OSes.
  • There is disagreement on effectiveness: scammers already talk victims through disabling Play Protect and installing VPNs; some liken this to “chastity belts” or abstinence education—raising barriers without fixing root causes or literacy.

Impact on normal users, special cases, and rights

  • Multiple comments stress that solutions which rely on ADB, custom ROMs, or JTAG are irrelevant to most users; those same “most users” are the main scam targets.
  • Proposed compromises include:
    • Strong opt‑out paths (developer mode, quizzes, multi‑day delays) with clear assumption of risk.
    • Hardware switches or regulatory “escape hatches” that fully transfer responsibility to the owner.
  • Concerns are raised about:
    • Screen‑reader users relying on powerful third‑party accessibility apps only available as APKs.
    • Banking and payment apps refusing to run on non‑stock or hardened Android (GrapheneOS) despite their strong security posture.

Alternatives and meta‑discussion

  • Extensive debate over alternatives: AOSP forks (Lineage, /e/), GrapheneOS, Librem 5 / PureOS, postmarketOS.
    • Tradeoffs: hardware support, cameras/modems, app compatibility, attestation, update cadence, usability for “grandma.”
  • Many see the Purism post as one‑sided FUD and mainly an ad; others say even if motivated marketing, it still surfaces a real and growing direction: Android drifting toward Apple‑style control.