Our Farewell from Google Play
Google Play SDK Requirements and Maintenance Burden
- Many SECUSO-style apps are small, offline, “finished” utilities that don’t inherently need updates, but Play Store rules force regular target SDK bumps.
- Developers report that “just changing targetSdkVersion” is rarely trivial: newer SDKs and tooling can break layouts, libraries, storage access, permissions, notifications, and UI (e.g., edge-to-edge rendering, gesture navigation).
- Some argue that in minimal apps with few permissions a manifest tweak and rebuild with an older toolchain can suffice; others counter with real examples where this failed and required invasive rewrites.
- Result: some devs abandon Play, self-host APKs, or move to other tech (e.g., PWAs) because maintenance adds no user-visible value.
Security Rationale vs. Overreach
- Supporters of Google’s policy note that older SDK targets allowed broad, abusable permissions and aggressive notifications; requiring modern APIs is framed as essential for privacy, security, and power efficiency.
- Critics say Play’s enforcement is blunt: even harmless, offline apps are hidden from new users if not updated, while scammy, ad-heavy apps flourish.
- Suggestions include more targeted measures (e.g., special prompts for risky permissions) instead of de facto annual rebuild requirements.
- Android’s progressively rising minimum installable target SDK means that even outside Play, old apps eventually stop working on new OS versions.
App Store Power, Walled Gardens, and Alternatives
- Several commenters see this as part of a broader trend: app stores optimize for revenue-generating, frequently updated apps, not small community or free tools.
- F-Droid and Aurora Store are praised as ways to install privacy-oriented apps and even Play apps without a Google account; experiences differ on how easy it is to set up Android without any account.
- iOS is viewed as stricter: essentially no sideloading and removals of long-stable games; some say both platforms are hostile to niche or indie software.
- Some devs avoid official marketplaces entirely, or move to PWAs to escape constant policy churn and approval friction.
Screenshot Blocking and “Security Theatre”
- Strong pushback against apps (especially banking/brokerage) that use Android’s FLAG_SECURE to block screenshots, seen as anti-user and harmful for record-keeping and dispute evidence.
- Others defend it as a mitigation against malware harvesting on-screen data, even if imperfect.
- Several note that checklist-driven pen tests routinely demand screenshot blocking, obfuscation, and similar measures, which some practitioners regard as low-value “security theatre.”