Android developer verification: Early access starts
Scope of the Change: Rollback or Rebrand?
- Some readers initially read this as Google “rolling back” mandatory verification, but others point out verification is still required for developers who want smooth distribution outside Play (web, alternative stores).
- The new promise is on the user side: an “advanced flow” to let users install unverified apps, instead of forbidding installs from non-verified developers.
- Details of this flow are not yet defined, which many find critical: it could be a one‑time expert switch, or an onerous, per‑install obstacle.
Security, Scams, and Android’s Permission Model
- Google frames the change as response to large-scale phone scams (notification interception, SMS 2FA theft, remote-control apps, coercion over calls).
- Several commenters argue this exposes weaknesses in Android’s notification and permissions model rather than justifying identity‑based app gating.
- Others counter that powerful APIs (accessibility, notification listeners) are essential for legitimate tools (KDE Connect, automation, accessibility apps) and inevitably abusable.
Motives: Safety vs Control and Revenue
- Many are skeptical that “keeping users safe” is the top priority; they see primary motives as:
- Protecting Play Store revenue and blocking apps like YouTube ReVanced, NewPipe, ad blockers.
- Satisfying banks, regulators, and governments pushing for tighter control, ID‑binding, and easier surveillance.
- Some note Google tolerates scammy ads and Play Store malware, which undermines the safety narrative.
Impact on Sideloading, F-Droid, and Indie Devs
- Key concern: whether F-Droid and similar stores can still function without each app being tied to a Google-verified identity.
- “Student/hobbyist” accounts with install caps are seen as constraining grassroots projects and politically sensitive apps (e.g., abortion support, dissent tools).
- A $25 developer fee and mandatory accounts are viewed as needless friction for open‑source and private distribution.
Designing a Coercion‑Resistant “Advanced Flow”
- Ideas floated:
- Time‑delayed enabling (e.g., 24–48 hours), especially blocked while on a phone call.
- Putting controls under “Developer Options” or requiring ADB, to filter out most victims.
- Some doubt coercion‑proofing is even possible; any path power users can use can be scripted for victims.
Ownership, Rights, and Regulation
- Strong philosophical thread: if users buy hardware, they should control what runs on it; tying software freedom to Google accounts or policies is seen as illegitimate.
- Others respond that legal and regulatory pressure (banks, governments in specific countries) make broad, easy sideloading politically risky for Google.
- Antitrust and Epic v. Google are mentioned as background forces pushing Google to soften the original, more restrictive plan.