Android developer verification: Early access starts

Scope of the Change: Rollback or Rebrand?

  • Some readers initially read this as Google “rolling back” mandatory verification, but others point out verification is still required for developers who want smooth distribution outside Play (web, alternative stores).
  • The new promise is on the user side: an “advanced flow” to let users install unverified apps, instead of forbidding installs from non-verified developers.
  • Details of this flow are not yet defined, which many find critical: it could be a one‑time expert switch, or an onerous, per‑install obstacle.

Security, Scams, and Android’s Permission Model

  • Google frames the change as response to large-scale phone scams (notification interception, SMS 2FA theft, remote-control apps, coercion over calls).
  • Several commenters argue this exposes weaknesses in Android’s notification and permissions model rather than justifying identity‑based app gating.
  • Others counter that powerful APIs (accessibility, notification listeners) are essential for legitimate tools (KDE Connect, automation, accessibility apps) and inevitably abusable.

Motives: Safety vs Control and Revenue

  • Many are skeptical that “keeping users safe” is the top priority; they see primary motives as:
    • Protecting Play Store revenue and blocking apps like YouTube ReVanced, NewPipe, ad blockers.
    • Satisfying banks, regulators, and governments pushing for tighter control, ID‑binding, and easier surveillance.
  • Some note Google tolerates scammy ads and Play Store malware, which undermines the safety narrative.

Impact on Sideloading, F-Droid, and Indie Devs

  • Key concern: whether F-Droid and similar stores can still function without each app being tied to a Google-verified identity.
  • “Student/hobbyist” accounts with install caps are seen as constraining grassroots projects and politically sensitive apps (e.g., abortion support, dissent tools).
  • A $25 developer fee and mandatory accounts are viewed as needless friction for open‑source and private distribution.

Designing a Coercion‑Resistant “Advanced Flow”

  • Ideas floated:
    • Time‑delayed enabling (e.g., 24–48 hours), especially blocked while on a phone call.
    • Putting controls under “Developer Options” or requiring ADB, to filter out most victims.
    • Some doubt coercion‑proofing is even possible; any path power users can use can be scripted for victims.

Ownership, Rights, and Regulation

  • Strong philosophical thread: if users buy hardware, they should control what runs on it; tying software freedom to Google accounts or policies is seen as illegitimate.
  • Others respond that legal and regulatory pressure (banks, governments in specific countries) make broad, easy sideloading politically risky for Google.
  • Antitrust and Epic v. Google are mentioned as background forces pushing Google to soften the original, more restrictive plan.