Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户给的文章是关于Google对Android侧载功能的新政策。首先,我得通读整篇文章,抓住主要信息。 文章提到Google推出了新的“高级流程”,要求从未经验证的开发者安装应用时必须等待24小时。这是为了平衡开放性和安全性。背景是去年Google要求所有应用必须由验证的开发者注册才能安装在认证设备上,以更快识别不良行为者,防止分发恶意软件。 此外,文章还提到一些开发者和市场对这一政策的批评,认为这可能带来摩擦和进入障碍,并引发隐私和监控担忧。Google回应说,新流程允许高级用户继续从未经验证的开发者安装应用,但需完成一系列步骤,包括启用开发者模式、确认自主操作、重启手机、生物认证或PIN码确认等。 最后,Google计划提供免费的“有限分发账户”,供业余开发者和学生分享应用,且不需要政府颁发的ID或注册费。这些变化将于2026年8月生效。 总结时要涵盖主要政策变化、批评声音以及Google的回应措施。控制在100字以内,直接描述内容。 </think> Google推出新的Android侧载功能"高级流程",要求从未经验证开发者安装应用需等待24小时,并完成多项安全验证步骤。该政策旨在平衡开放性和安全性,并针对去年实施的应用开发者身份验证要求引发的批评作出回应。新流程允许高级用户继续使用侧载功能,并提供免费"有限分发账户"供业余开发者和学生使用。 2026-3-20 10:57:0 Author: thehackernews.com(查看原文) 阅读量:14 收藏

Data Privacy / Mobile Security

Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.

The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to be installed on certified Android devices. The move, it added, was done to flag bad actors faster and prevent them from distributing malware.

This also includes potential scenarios where cybercriminals trick unsuspecting users who sideload such apps into granting them elevated privileges that make it possible to turn off Play Protect, the anti-malware feature built into all Google-certified Android devices.

However, the mandatory registration requirements have been met with criticism from over 50 app developers and marketplaces, including F-Droid, Brave, The Electronic Frontier Foundation, Proton, The Tor Project, Vivaldi, who say they risk creating friction and barriers to entry, and raise privacy and surveillance concerns in the absence of clarity about what personal information developers must provide, how this data will be stored, secured, and used, and if it could be subject to government requests or legal processes.

As a way of quelling some of these thorny issues, Google has emphasized that the newly developed advanced flow allows power users to maintain the ability to sideload apps from unverified developers with a one-time process that requires them to follow the steps below -

  • Enable developer mode in system settings.
  • Confirm that they are taking this step of their own volition and are not being coached.
  • Restart the phone and re-authenticate so as to prevent a scammer from monitoring what actions a user is taking.
  • Wait for a 24-hour period and confirm that they are really making this change with biometric authentication or device PIN.
  • Install apps from unverified developers once users understand the risks, either indefinitely or for a period of seven days.

"In that 24-hour period, we think it becomes much harder for attackers to persist their attack," Android Ecosystem President, Sameer Samat, was quoted as saying to Ars Technica. "In that time, you can probably find out that your loved one isn’t really being held in jail or that your bank account isn’t really under attack."

Google also said it plans to offer free "limited distribution accounts" that let hobbyist developers and students share apps with up to 20 devices without having to "provide a government-issued ID or pay a registration fee."

It's worth noting that the aforementioned process does not apply to installs via the Android Debug Bridge (ADB). Limited distribution accounts for students and hobbyists, as well as advanced flow for users, will be available in August 2026, before the new developer verification requirements take effect the month after.

"We know a 'one size fits all' approach doesn't work for our diverse ecosystem," Google said. "We want to ensure that identity verification isn't a barrier to entry, so we’re providing different paths to fit your specific needs."

The development coincides with the emergence of a new Android malware called Perseus that's actively targeting users in Turkey and Italy with an aim to conduct device takeover (DTO) and financial fraud.

Over the four months, at least 17 Android malware families have been detected in the wild. They include FvncBot, SeedSnatcher, ClayRat, Wonderland, Cellik, Frogblight, NexusRoute, ZeroDayRAT, Arsink (and its improved variant SURXRAT), deVixor, Phantom, Massiv, PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
如有侵权请联系:admin#unsafe.sh