F-Droid and Google’s developer registration decree
Impact on F‑Droid and Android Ecosystem
- The new Google developer registration and app‑ID control is widely seen as an existential threat to F‑Droid and similar third‑party stores.
- F‑Droid refuses to “take over” package IDs for other people’s apps (would effectively seize distribution rights), but Google’s model assumes a DNS‑like central authority for IDs and intents.
- Centralizing registration under Google is viewed as giving it a kill‑switch over all apps on “certified” devices, even those installed from other stores.
- Some argue the “least‑bad” path for F‑Droid might be renaming app IDs or owning keys, but this conflicts with FOSS norms and worsens centralization.
Security, Abuse, and Google’s Stated Rationale
- Supporters frame the change as anti‑malware and anti‑scam: less tricking non‑technical users into sideloading malicious APKs; developer traceability raises the bar for criminals.
- Critics counter that Play Store itself is full of scams, abusive subscriptions, and shady apps, while F‑Droid’s curated, source‑built model has a much better track record.
- There’s pushback on the idea that anonymous distribution is “unnecessary”; others say hobbyist freedom is being sacrificed to “safety theater.”
Regulation, Age Verification, and Attestation
- Several comments tie this to broader regulatory trends: EU digital identity, age verification, Australia’s online safety codes, and device attestation (SafetyNet/Play Integrity).
- Fear that governments will increasingly require “certified” devices and OSes for banking, IDs, transit, and age‑gated content, effectively banning user‑administered systems from daily life.
- Some see Google and Apple lobbying to turn such rules into de‑facto platform lock‑in (regulatory capture).
Licensing and Signing‑Key Complications
- GPLv3’s “installation information” clause is debated: does a Google‑controlled key system break the requirement that users be able to install modified versions?
- Reproducible builds and developer‑held keys are suggested as a partial escape hatch, but many apps don’t have reproducible builds yet.
- Concerns about Google requiring app signing keys or proofs of key ownership even for out‑of‑store distribution.
Alternatives: Custom ROMs and Linux Phones
- Many mention LineageOS, GrapheneOS, /e/OS, Ubuntu Touch, postmarketOS, Librem 5, Fairphone, PinePhone, Shift, Volla, etc. as escape routes.
- However, banking/government apps and attestation often block these systems, forcing dual‑phone setups or web‑only banking.
- Linux phones are praised for freedom but criticized for price, hardware limitations, app gaps, and reliability (e.g., emergency calling).
User Strategies and Tradeoffs
- Some already live Play‑free using F‑Droid, microG, Aurora Store, and manual APK downloads; others plan to move to GrapheneOS or even iOS as “the nicer walled garden.”
- A recurring tactic: keep a locked, “official” phone for banking/ID and a second, open device for everything else.
- Non‑technical family members are seen as effectively locked into Apple/Google because alternative setups are too complex.
Broader Fears: War on General‑Purpose Computing
- Many frame this as part of a “war on general computing”: secure boot, remote attestation, locked bootloaders, app notarization, and mandatory IDs converging into “digital techno‑feudalism.”
- Phones are increasingly treated as ad‑driven appliances rather than personal computers; some choose to minimize phone use or revert to dumbphones.
- Others stress that general‑purpose computing still survives on PCs and servers, but worry the same mechanisms will be applied there next.