Close Menu
geekfence.comgeekfence.com
    What's Hot

    AI-powered robot learns how to harvest tomatoes more efficiently

    March 20, 2026

    20 years in the AWS Cloud – how time flies!

    March 20, 2026

    This clever scam nearly hijacked a tech CEO’s Apple ID • Graham Cluley

    March 20, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Mobile»Balancing openness and choice with safety
    Mobile

    Balancing openness and choice with safety

    AdminBy AdminMarch 20, 2026No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Balancing openness and choice with safety
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Balancing openness and choice with safety

    Posted by Matthew Forsythe, Director Product Management, Android App Safety

    Android proves you don’t have to choose between an open ecosystem and a secure one. Since announcing updated verification requirements, we’ve worked with the community to ensure these protections are robust yet respectful of platform freedom. We’ve heard from power users that they want to take educated risks to install software from unverified developers. Today, we’re sharing details on a new advanced flow that provides this option.

    Graphic titled 'Sideloading is here to stay.' It shows a prompt with buttons for 'Don’t install' and 'Install anyway' next to text explaining that once risks are confirmed, users can install apps from unverified developers.

    Advanced flow safeguards against coercion

    Android is built on choice. That is why we’ve developed the advanced flow – an approach that allows power users to maintain the ability to sideload apps from unverified developers.


    This flow is a one-time process for power users – but it was designed carefully to prevent those in the midst of a scam attempt from being coerced by high pressure tactics to install malicious software. In these scenarios, scammers exploit fear – using threats of financial ruin, legal trouble, or harm to a loved one – to create a sense of extreme urgency. They stay on the phone with victims, coaching them to bypass security warnings and disable security settings before the victim has a chance to think or seek help. According to a 2025 report from the Global Anti-Scam Alliance (GASA), 57% of surveyed adults experienced a scam in the past year, resulting in a global consumer loss of $442 billion. Because the consequences of these scams that use sophisticated social engineering tactics are so severe, we have carefully engineered the advanced flow to provide the critical time and space needed to break the cycle of coercion.

    How the advanced flow works for users

    • Enable developer mode in system settings: Activating this is simple. This prevents accidental triggers or “one-tap” bypasses often used in high-pressure scams.
    • Confirm you aren’t being coached: There is a quick check to make sure that no one is talking you into turning off your security. While power users know how to vet apps, scammers often pressure victims into disabling protections.
    • Restart your phone and reauthenticate: This cuts off any remote access or active phone calls a scammer might be using to watch what you’re doing.
    • Come back after the protective waiting period and verify: There is a one-time, one-day wait and then you can confirm that this is really you who’s making this change with our biometric authentication (fingerprint or face unlock) or device PIN. Scammers rely on manufactured urgency, so this breaks their spell and gives you time to think.
    • Install apps: Once you confirm you understand the risks, you’re all set to install apps from unverified developers, with the option of enabling for 7 days or indefinitely. For safety, you’ll still see a warning that the app is from an unverified developer, but you can just tap “Install Anyway.”

    A secure Android for every developer

    We know a “one size fits all” approach doesn’t work for our diverse ecosystem. We want to ensure that identity verification isn’t a barrier to entry, so we’re providing different paths to fit your specific needs.

    In addition to the advanced flow we’re building free, limited distribution accounts for students and hobbyists. This allows you to share apps with a small group (up to 20 devices) without needing to provide a government-issued ID or pay a registration fee. This ensures Android remains an open platform for learning and experimentation while maintaining robust protections for the broader community.

    Limited distribution accounts and advanced flow for users will be available in August before the new developer verification requirements take effect.

    Visit our website for more details. We look forward to sharing more in the coming days and weeks.




    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Google Maps could soon get a long-overdue upgrade that replaces WhatsApp and Google Messages for location sharing – here’s how it’ll work

    March 19, 2026

    Google might be undoing some controversial changes to the Photos app

    March 18, 2026

    Apple TV’s new Keanu Reeves comedy looks hilarious, here’s the trailer

    March 17, 2026

    Samsung might already be done selling the Galaxy Z TriFold

    March 16, 2026

    Poco X8 Pro Max, Oppo Find N6 unboxed, Galaxy A57 listed, Week 11 in review

    March 15, 2026

    How to use the new ChatGPT app integrations, including DoorDash, Spotify, Uber, and others

    March 14, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202521 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202620 Views

    The Complete Guide to Model Context Protocol

    October 29, 202512 Views
    Don't Miss

    AI-powered robot learns how to harvest tomatoes more efficiently

    March 20, 2026

    Farm labor shortages are pushing agriculture toward greater automation, especially when it comes to harvesting.…

    20 years in the AWS Cloud – how time flies!

    March 20, 2026

    This clever scam nearly hijacked a tech CEO’s Apple ID • Graham Cluley

    March 20, 2026

    B.C.’s EV sales regulation ensures British Columbians can access the cost-saving EVs they want—and should be revised, not repealed

    March 20, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    AI-powered robot learns how to harvest tomatoes more efficiently

    March 20, 2026

    20 years in the AWS Cloud – how time flies!

    March 20, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.