Google plans to implement new requirements for sideloaded apps on Android devices, impacting how apps are distributed and installed globally.
Policy Changes and Timeline
Starting September 2026, Android devices with Google Mobile Services (GMS) will only allow app installations from developers who have completed a government ID verification process. This move aims to ensure apps come from "verified developers," but critics argue it restricts openness and innovation within the Android ecosystem.
Apps popular on platforms like F-Droid, such as NewPipe and Blokada, may face challenges as many developers prefer anonymity and may choose not to undergo the verification process. Google's strategy does not eliminate sideloading but creates a control point that could reduce the distribution of open-source applications.
Impact on Developers and Users
The new verification requirement may deter indie developers and hobbyists who prioritize privacy or cannot justify the effort and cost of verification. The policy could also negatively affect ecosystems centered around liberally distributed APKs (Android Package Kits). Although such apps will still be functional on non-certified devices like custom ROMs or de-Googled phones, these represent a minor portion of the market.
Google asserts that the changes will enhance security, but skeptics point out that verified identity does not preclude the presence of harmful software. Critics warn that shifting trust from user discretion to a central verification process might erode user autonomy and stifle grassroots innovation.
Security and Industry Reactions
Though Google cites security as a core reason for these changes, critics argue that Android's existing on-device scanning and warnings are adequate for maintaining safety. They suggest that these new requirements could shield Google from liability related to sideloaded malware rather than significantly boosting security.
As developers and users adapt, potential workarounds include using uncertified devices or alternative app stores. However, these options may introduce additional complexity and security risks.