Home » Technology » Singapore Sideloading Ban: Google Requires App Developer Verification

Singapore Sideloading Ban: Google Requires App Developer Verification

Google to Enhance Android Security by Requiring Developer‍ Verification

Google⁣ is‍ implementing new security measures to ‍combat ​the ⁢increasing threat of malware delivered through sideloaded apps. Recent analysis by ⁣Google revealed that apps obtained from ‍sources⁢ outside of the Google play‍ Store – through ‌internet sideloading – contained over 50 times more malware than⁢ apps​ available on the official platform.

The new​ policy will ⁣require verification of ⁤all Android developers, making it more arduous for malicious actors to redistribute harmful apps after they’ve been removed from the ⁢Play ‌Store. Google describes the process as similar to an “ID check at the airport,” focusing on confirming the developer’s identity rather than scrutinizing the ‌app’s ‍content itself.

The ⁣rollout will begin ‌in Singapore, Brazil, Indonesia, and Thailand, with a global⁣ expansion planned‍ to commence in 2027.

Singapore has already been⁢ piloting a⁤ related feature since Febuary⁤ 2024, blocking Android⁣ users from installing apps from‌ unverified sources. Despite this measure, ⁢attempts to install risky apps have continued.Between February and August 2024, Google blocked more than 900,000 attempts by ​users in Singapore to install high-risk mobile applications that could ‌compromise‌ device security.

Currently, ​Android users can sideload ⁢apps from the internet and alternative app stores like ‍F-Droid, though this functionality isn’t enabled by⁣ default and requires⁣ users​ to adjust their phone’s settings. ‍Popular reasons for sideloading include accessing modified versions of existing ‍apps (like YouTube ⁣with ad-blocking or premium features unlocked), ⁣discontinued apps no longer available​ on the Play Store, and open-source apps allowing for customization.

The enhanced‌ security ⁢feature,google Play Protect,operates in the background ‍to prevent ​the installation of‌ unofficial apps ‌requesting suspicious permissions,such as access to text messages.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.