Google restricts Android sideloading
Framing and terminology
- Several comments object to the word “sideloading,” arguing it normalizes the idea that installing your own software is unusual; they prefer calling it simply “installing apps on your own device.”
- Others think language-policing is a distraction from more practical issues, though there’s broad agreement that framing matters in public and regulatory debates.
What Google changed (scope and mechanics)
- Change is currently a pilot in Singapore only, targeting:
- Apps requesting high‑risk permissions (SMS, notifications, accessibility).
- Installs from “internet-sideloading sources”: browsers, messaging apps, file managers.
- F‑Droid and other app stores appear unaffected if they set installer metadata correctly; ADB installs still work; Play Protect can usually be disabled, with some constraints (e.g. not while on a call).
- Many note that technically savvy users still have multiple paths; the friction is mainly for average users.
Security vs. autonomy and competition
- One camp sees this as a reasonable anti‑fraud measure: Singapore has large losses from Android malware scams, mostly via sideloaded apps; banks are already locking accounts when “unverified apps” are present.
- Others see it as “boiling the frog”: each increase in friction for non‑Play installs nudges users and developers into Google’s walled garden, reinforcing Play Store lock‑in and enabling APIs (Play Integrity) that disadvantage alternative OSes.
- There is disagreement on effectiveness: scammers already talk victims through disabling Play Protect and installing VPNs; some liken this to “chastity belts” or abstinence education—raising barriers without fixing root causes or literacy.
Impact on normal users, special cases, and rights
- Multiple comments stress that solutions which rely on ADB, custom ROMs, or JTAG are irrelevant to most users; those same “most users” are the main scam targets.
- Proposed compromises include:
- Strong opt‑out paths (developer mode, quizzes, multi‑day delays) with clear assumption of risk.
- Hardware switches or regulatory “escape hatches” that fully transfer responsibility to the owner.
- Concerns are raised about:
- Screen‑reader users relying on powerful third‑party accessibility apps only available as APKs.
- Banking and payment apps refusing to run on non‑stock or hardened Android (GrapheneOS) despite their strong security posture.
Alternatives and meta‑discussion
- Extensive debate over alternatives: AOSP forks (Lineage, /e/), GrapheneOS, Librem 5 / PureOS, postmarketOS.
- Tradeoffs: hardware support, cameras/modems, app compatibility, attestation, update cadence, usability for “grandma.”
- Many see the Purism post as one‑sided FUD and mainly an ad; others say even if motivated marketing, it still surfaces a real and growing direction: Android drifting toward Apple‑style control.