Loading...
Loading...
Google is overhauling Android sideloading on certified devices to curb malware and scam-driven installs, citing far higher abuse from internet-sideloaded APKs than Play Store apps. The plan adds developer verification for apps distributed outside Google Play—requiring identity checks, a $25 fee, and key-related steps—rolling out first in higher-risk countries and supported by a new console for non‑Play distribution. To address backlash over reduced openness, Google is also introducing an “advanced flow” that lets determined power users install unverified apps, but only after deliberate friction such as Developer Mode, reauthentication, a mandatory reboot, and a 24‑hour cooling-off period.
Google has introduced two changes to the sideloading flow on certified Android devices: a mandatory device reboot and a 24-hour wait before users can enable installation of unsigned apps. The update targets installation of unsigned APKs via Settings > Install unknown apps, adding friction intended to reduce malware risks. Key players are Google and Android device manufacturers; the change applies to certified devices and affects power users, developers, and sideloading workflows for apps outside official stores. It matters because it tightens platform security but also reduces flexibility for advanced users, complicates testing and distribution of apps outside Google Play, and may push some users toward uncertified devices or alternative sideloading workarounds.
Google is adding two security measures to Android sideloading: a 24-hour waiting period and a mandatory device reboot before installing internet-sourced APKs, plus developer verification for apps on certified Android devices starting next year. Announced by Suzanne Frey, the changes aim to curb repeat malicious actors who exploit sideloading—Google says internet-sideloaded sources produced 50× more malware than Play-listed apps—and build accountability by requiring developers to register and verify when distributing off-Store. The company will launch verification selectively in countries most affected, provide a dedicated Android Developer Console for non‑Play distributors, and offer accommodations for students and hobbyists. The moves are framed as balancing openness and security to reduce fraud and financial-data theft.
Google is adding developer verification, a 24-hour waiting period and mandatory device reboot to Android sideloading on certified devices to curb repeat malware and impersonation attacks. Starting next year in select countries, apps installed outside Google Play will require registration by verified developers; Google will confirm developer identity but not review app content. The company says developer IDs cut abuse and referenced prior Play verification success. It will launch a dedicated Android Developer Console for off-store distributors and offer concessions for students and hobbyists. The measures aim to raise accountability, slow rapid re-distribution of malicious apps, and protect users’ financial data and privacy.
Android developer verification: Balancing openness and choice with safety
Google will let Android users install apps from unverified developers via a frictioned “advanced flow” and a limited distribution option, reversing part of its earlier verification rule. Starting August, users can enable an advanced flow that requires developer mode, explicit anti-coercion confirmations, a device restart, reauthentication, biometric or PIN confirmation, and a one-day waiting period before allowing installs; options allow seven-day or indefinite enabling. Google also offers free limited-distribution accounts for sharing apps with up to 20 people for students and hobbyists. The change aims to balance openness and safety, addressing community backlash over a $25 developer verification fee and identity-document requirement that critics argued restricted sideloading.
Google announced an "advanced flow" for Android developer verification that lets experienced users sideload apps from unverified developers while defending against scam coercion. Posted by Matthew Forsythe, the new one-time process adds deliberate friction: enabling developer mode, a coaching check, a forced restart and reauthentication, and a one-day waiting period before biometric or PIN confirmation. After that, users can install with temporary (7-day) or indefinite allowances but will still see unverified warnings. Google says the design is intended to preserve platform openness and lower verification barriers for legitimate developers, while mitigating high-pressure social-engineering scams implicated in large consumer losses. The company also plans alternate verification paths (e.g., limited distribution) to support diverse developers.
Google has announced a new “advanced flow” for Android sideloading that adds a mandatory 24-hour cooling-off period before users can install apps from unverified developers, according to The Verge. The change applies to a one-time sideloading process intended for higher-risk installs outside trusted distribution channels. By forcing a delay, Google aims to reduce impulsive installations that can lead to malware infections, scams, or other security incidents, while still allowing sideloading for users who need it. The move reflects Google’s ongoing effort to balance Android’s openness with stronger protections against harmful apps distributed through unofficial sources. The Verge report did not specify rollout timing, Android version requirements, or whether the feature will vary by region or device maker.
Google says it will tighten Android sideloading rules in 2026 to reduce malware, requiring most apps installed outside Google Play to come from “verified” developers. Android Ecosystem President Sameer Samat told Ars Technica the company adjusted its approach after feedback, adding a new “advanced flow” that lets power users bypass verification, though it will be buried in developer settings. Starting in September, Google will begin restricting sideloading via its developer verification program. To be verified, developers distributing apps outside Play must provide identification, upload a copy of their signing keys, and pay a $25 fee. Unverified developers’ apps will otherwise be blocked from installation. The changes could improve ecosystem security but add friction for independent developers and alternative app distribution.
Google is preparing to require developer verification for Android app distribution, a move framed as improving security but criticized as mirroring Apple's tightened control over its ecosystem. The proposed change would restrict how apps are installed and distributed outside the Play Store, potentially forcing developers to verify identities and comply with new policies. Critics warn this could erode Android’s open-source, fork-friendly legacy, concentrate gatekeeping power with Google, and raise barriers for independent developers, sideloading, and alternative app stores. Supporters argue verification will reduce malware and abuse. The outcome matters for mobile platform competition, developer freedom, user choice, and the balance between security and openness on Android.