Google is turning Android into a permissioned platform

Google is turning Android into a permissioned platform

Before you read further, visit Keep Android Open. It lays out the policy, the timeline, the open letter, and the practical ways to push back while there is still time. If Android’s openness is one of the reasons you bought your phone in the first place, this is the moment to pay attention.

The loudest slogan in this fight is not fully accurate. Google has not said that every Android device on Earth locks down in September 2026. Its own timetable says the first enforcement wave begins on September 30, 2026 in Brazil, Indonesia, Singapore, and Thailand, with broader global rollout in 2027 and beyond. But the slogan lands because it names the deeper shift correctly: Google is moving Android app installation on certified devices away from a default freedom and toward a permission system that Google administers.

Google’s program is not limited to the Play Store. It applies to apps installed on certified Android devices, regardless of whether they come from Google Play, a third-party store, or a direct download. Developers distributing outside Play are being pushed into a new Android Developer Console, identity verification, and package-name registration. Google says the purpose is accountability, not content review, and presents the plan as a response to scam-driven malware. Critics see something else: a platform owner extending its reach past its own storefront and into the basic act of installing software on hardware people already bought.

That is why this story matters even if you never touch F-Droid, never test APKs, and never open developer settings. A platform’s character is set by what ordinary owners are allowed to do without special permission. Once direct installation becomes a tolerated exception rather than a normal capability, Android is no longer defending its old identity. It is redesigning it.

The slogan gets one date wrong and one principle right

The first correction is simple and worth making, because credibility matters. The “worldwide in September 2026” line from campaign material is stronger than Google’s own public timeline. Google says the first enforcement step hits four countries in late September 2026, then expands in later phases. That detail does not rescue the policy. It just changes the shape of the warning. This is a staged closure, not a single-day global shutdown.

The principle, though, is harder to soften. Google’s documentation says apps installed on certified Android devices must be registered to verified developers. It also says this applies regardless of the app’s download source. That is the crucial line. Google is no longer saying, “If you want access to our store, follow our rules.” It is saying, “If you want your app installable on certified Android devices, follow our rules.” That reaches far beyond Google Play.

There are still carve-outs. Managed enterprise distribution is treated differently on managed devices. Developers can still use ADB for development and testing. Users can still install unregistered apps through the new advanced flow. Students and hobbyists are being offered a limited-distribution path. Those escape hatches matter, and pretending they do not exist makes the case weaker than it needs to be. Still, none of them restores the old baseline, where an Android owner could install software from outside the Play Store without passing through a structure designed by Google for “power users” and “approved” developers.

That is why the ownership question will not go away. People do not buy phones as ceremonial licensees. They buy them as devices they expect to control. Android built a large part of its identity on that expectation. Even users who never touched an APK knew, at least vaguely, that Android was the phone platform where you could go off-road. The moment that freedom becomes bureaucratic, delayed, and conditionally tolerated, the promise changes. Not rhetorically. Structurally.

A rule that reaches past the Play Store

Google’s own materials are unusually clear about the scope. The landing page for Android developer verification says that starting in September 2026, apps in select regions must be registered to a verified developer to be installed on certified Android devices. The guide goes further and spells out that the rule applies regardless of download source. A developer distributing only outside Google Play must create an Android Developer Console account. A Play developer can use the Play Console and, in many cases, be registered automatically using information Google already has.

That distinction matters because it shows who bears the new burden. Big commercial publishers already inside Google’s ecosystem mostly absorb this as another compliance layer. Google says most Play developers will not need new identity steps, and that it expects to auto-register roughly 98 percent of existing Play apps. The harder hit lands on the edges of the ecosystem: independent developers, privacy-focused projects, niche utilities, direct-download vendors, alternative repositories, research tools, nonprofit distributions, and anyone who stayed outside Play by choice.

The three paths Google now offers

PathWho it servesWhat it allowsMain limit
Full distributionOrganizations and professional developersUnlimited installs on certified devices, including outside PlayIdentity checks, package registration, and account fees
Limited distributionStudents, hobbyists, personal sharingRegistered apps for a small circleUp to 20 explicitly authorized devices
Unregistered installsUsers who still want direct installs from unverified developersInstallation through advanced flow or ADBHigh-friction advanced flow; ADB remains a technical path

The table above is drawn from Google’s landing page, the verification guide, the limited-distribution guide, the FAQ, and Google’s own PDF guide for the Android Developer Console. The pattern is plain: commercial distribution gets normalized through verification, informal sharing gets capped, and unverified distribution gets pushed into a warning-heavy exception path.

A platform can stay nominally “open” while steadily moving every meaningful use case into approved channels. That is what makes this policy more serious than a paperwork story. Google is building a hierarchy of legitimacy. Verified commercial developers get continuity. Small hobbyists get a fenced sandbox. Everyone else gets friction. That is not identical to iOS, and it is not a literal ban on sideloading. It is something more subtle and, for Android’s history, more corrosive: freedom recoded as an exception.

The burden on developers is larger than Google admits

Google likes to frame developer verification as an identity check paired with package registration. That description is technically correct and politically incomplete. The official landing page says developers may need to provide legal name, address, email, phone number, and official government ID. The Android Developer Console guide adds more texture: individuals must submit government-issued photo ID and proof of address; organizations need a D-U-N-S number and website verification. Google’s PDF guide for the Android Developer Console says full-distribution account creation ends with a $25 fee.

For a company with a legal department, a corporate site, a billing address, and a Play relationship, that is manageable. For a pseudonymous privacy tool developer, an open-source volunteer, a teenager writing software for friends, or a politically exposed developer in a hostile environment, it is a different kind of demand. Brave argues that the privacy risk falls hardest on developers of encrypted messaging apps, VPNs, Tor tools, and software for journalists and activists. The EFF makes a similar point: volunteer projects and people who do not use the name on a government ID are exactly the communities most likely to be chilled by a central registry.

Google’s answer is the limited-distribution account. That path is real, and critics should acknowledge it. Google says students and hobbyists can use a free account, skip government ID, and share apps with up to 20 explicitly authorized devices. That is better than no concession at all. It is also nowhere near a substitute for open distribution. Open-source software does not become open because it reaches nineteen friends and a teacher. Research tools do not stay viable because they fit inside a classroom-sized quota. Grassroots ecosystems survive because software can move beyond the social graph of the author.

The package-name side of the policy also deserves more attention than it gets. Google says developers must establish a formal link between package names and signing keys. For Play developers, that will often be automatic. For outside-Play developers, it can mean proving ownership of the private signing lineage. That is ordinary paperwork for a well-kept product pipeline. It is a real barrier for older projects, inherited projects, community forks, or messy volunteer software with imperfect operational history. The system was designed with commercial continuity in mind. Android’s long tail was not built that neatly.

Critics are right to say the chilling effect is not captured by the fee alone. The real cost is attribution, centralization, and dependency. Once your legal identity, package names, signing fingerprints, and distribution rights sit inside one corporate registry, you may be allowed to keep shipping software, but you are shipping it on terms that can be tightened later. That is a different kind of relationship with the platform than Android spent years advertising.

Android still has exits, but they no longer feel like rights

Google did not hold its original line forever. After backlash from F-Droid, civil-liberties groups, browser vendors, and developers, it introduced the “advanced flow” for users who still want to install apps from unverified developers. Google’s March 2026 blog post and FAQ describe it as a one-time setup for power users. That concession is real, and it changes the policy from “verified developers only” to “verified developers by default, unverified developers behind a deliberate obstacle course.”

The obstacle course is the story. Google says users must enable developer mode, confirm they are not being coached, restart the phone, wait a day, re-authenticate with biometrics or device PIN, then choose whether to allow unverified installs for seven days or indefinitely. Google says the point is to break coercive scam patterns by killing urgency. The Verge’s walkthrough of Google’s flow is blunt about what this looks like from the user side: a one-off process, yes, but one built around a mandatory one-day delay and a strong assumption that installing outside the registry is an activity for a narrow class of unusually technical users.

ADB remains open. Google’s FAQ says the 24-hour waiting period does not affect ADB installs, and developers can still install apps that way for development and testing. That matters for professional workflows. It matters less for ordinary owners. A platform is not meaningfully open to the general public because command-line tooling survives. ADB is a lifeboat for developers, tinkerers, and support forums. It is not the normal path by which communities share software.

Google’s April rollout update adds another revealing detail. It says users will begin seeing Android Developer Verifier in their Google Systems services settings, and that advanced flow and limited distribution will launch globally in August 2026 before the first regional enforcement date. That places enforcement in a Google-controlled service layer on certified devices, not inside the slower rhythm of annual Android version upgrades. Google would likely call that practical security delivery. Critics will hear something else: the policy sits in a mechanism Google can iterate centrally.

A right that survives only through a cumbersome bypass starts to resemble a privilege. That is the emotional force behind the anger around this policy. Android owners are being told they still have a choice, but it is the kind of choice you are expected to exercise rarely, defensively, and under warning labels. Google is not erasing agency outright. It is teaching users to experience agency as deviance.

Security is the strongest case Google has and still not enough

Google is not inventing the threat model from thin air. In its August 2025 announcement it said the policy was aimed at repeat perpetrators of fraudulent app scams. In the March 2026 rollout update it said its analysis found over 90 times more malware from sideloaded sources than on Google Play. In the advanced-flow post, Google also cited the Global Anti-Scam Alliance’s 2025 research, which reported that 57 percent of adults surveyed experienced a scam in the prior year. Scam pressure is real. Malware from unvetted channels is real. That part of Google’s argument deserves to be treated seriously.

Still, a real threat does not automatically justify a central registry for all developers whose software may be installed on certified devices. Google already runs Play Protect, which scans apps at install time, periodically scans devices, can disable or remove harmful apps, and can request code-level evaluation of apps installed from outside Google Play. Google’s own help pages make plain that Play Protect already works across software from other sources, not just Play. That weakens the claim that a new identity registry is the only meaningful answer left on the board.

There is also a conceptual problem. Google compares developer verification to an airport ID check. The analogy gives away the limitation. An ID check verifies who a person is, not whether the bag is dangerous. Google itself says it is verifying the developer, not reviewing the app’s content. That may help with repeat bad actors who keep reappearing under fresh aliases. It does not solve the larger security problem of harmful code, compromised accounts, coercive acquisitions, sloppy publishers, or malicious apps shipped by verified entities. If the policy is sold as a broad safety guarantee, it is oversold.

Critics push from the other side. F-Droid argues that transparent builds, source-code review, reproducibility, and public logs provide a stronger trust model than a single corporate gate. The EFF warns that once a gate exists, governments and private actors will try to use it, and that once a database exists, others will try to access it. Those arguments do not make sideloading risk-free. They do show that “more centralization” is not the only security philosophy available. It is one philosophy, and it happens to align neatly with corporate control.

The hard question is not whether Android has a malware problem outside Play. It does. The hard question is whether every non-Play developer should have to stand inside Google’s registry before ordinary users can install their software without ceremony. Google has not made that case convincingly. It has made a narrower case about fraud, recidivism, and scam coercion, then turned it into a general architecture for platform control.

The Apple comparison hides the real difference

A common shrug in this debate goes like this: Apple already does this, so Android is merely catching up. That is comforting and sloppy. Apple’s EU trader rules exist in response to the Digital Services Act, and Apple’s own documentation says they apply to traders distributing apps on the App Store in the European Union. Apple verifies and displays contact information for traders on EU App Store product pages, and developers can assess trader status per app. If you are not distributing on the App Store in the EU, Apple’s documentation treats that differently.

Google’s policy is built on a different layer. Google’s guides say developer verification applies to all apps installed on certified Android devices in covered regions, regardless of source. The comparison is not App Store rule versus Play Store rule. It is store compliance versus device-level installation policy. That is a larger reach.

That does not make Apple virtuous. Apple still operates a heavily controlled ecosystem, and its own EU trader requirements are demanding. The point is narrower than that. Android’s historical differentiator was not that Google was kinder than Apple. It was that Android left more room for software to circulate outside the platform owner’s own shop. When Google imports stronger identity and approval logic into installation on certified devices themselves, it narrows the distance between the two platforms where it mattered most: who gets to say yes before code runs.

This is why the phrase “Apple envy” stuck in coverage of the policy. The issue is not stylistic imitation. It is institutional convergence. Two giant mobile gatekeepers are moving toward stronger attribution, stronger approval paths, and stronger friction around independent software circulation. Users lose bargaining power when the differences between the two dominant phone ecosystems shrink in the same direction.

Competition law is already circling the same problem

Google is making this move in the middle of an antitrust fight over Android app distribution, not in some clean room where market power is irrelevant. In Epic v. Google, Judge James Donato ordered Google to open Google Play to rival app stores and to let developers point users toward outside payment and download options. The ruling attacked the structure Google had built to keep rival stores weak. That case was not about one verification program, but it was absolutely about gatekeeping.

The story did not end there. In March 2026, Google and Epic announced a settlement framework under which Google would lower Play fees and offer a Registered App Stores program. Google’s own Play policy update says the revised injunction still requires court action and that current policies remain in effect. Reporting from AP and The Verge shows that Google is pitching a trust-and-safety-based registration path for rival stores even as the U.S. court had ordered stronger remedies. The message is familiar: Google is willing to open the market, but on terms Google still designs.

Reuters reported on April 14, 2026 that Aptoide had filed a new antitrust suit accusing Google of using monopolistic practices to shut out rival Android app stores. Whether that case succeeds or not, its existence tells you the competitive question is alive right now. Rival stores are not reading Google’s new trust-and-safety infrastructure as a friendly gesture. They are reading it as one more layer of dependency on the dominant platform’s approval.

This is where the developer-verification program becomes more than a security policy. In a market already under scrutiny for store power, billing power, preinstallation leverage, and steering restrictions, a rule that reaches beyond Play and attaches Google-managed legitimacy to all installable apps on certified devices is bound to look like a gatekeeper’s instinct. Even a sincere safety rationale does not erase the competitive effect of making Google the registrar of software legitimacy on Android.

Android’s identity is being rewritten in public

What is happening to Android is neither the instant apocalypse described by the most dramatic campaign copy nor the harmless administrative cleanup described by Google. It sits in the middle, which is exactly why it matters. Android is not banning all direct installs. It is not locking every device worldwide on one date. It is not deleting ADB. But it is converting openness from an ordinary property of the platform into a managed exception surrounded by registration, attribution, friction, and centralized policy.

That is a bigger change than it looks. Platforms do not become closed only when a final door slams shut. They become closed when every remaining door turns into a compliance channel. Owners feel that difference long before lawyers finish defining it. Developers feel it earlier still. The people most exposed are rarely the giant publishers Google already knows. They are the small, weird, privacy-minded, local, nonprofit, experimental, pseudonymous, and politically inconvenient builders who gave Android much of its character in the first place.

Google still has room to narrow the damage. It could keep Play-specific verification strict while leaving device-level installation outside Play far more permissive. It could preserve a simple owner-controlled local install path that does not require a ritualized 24-hour wait. It could expand the hobbyist path beyond 20 devices, protect pseudonymous noncommercial publishing, and write stronger limits around data retention and secondary use of developer identity records. None of those ideas would satisfy every critic. They would at least show that Google understands the difference between fighting scams and redesigning the ownership model of the world’s biggest mobile platform.

The open-Android argument was never only about tinkerers. It was about the kind of computer a phone is allowed to be. A phone you own should not quietly become a phone you operate on permission. Google’s timeline may be slower than activists say. The direction is plain enough.

FAQ

Is Google blocking all Android apps worldwide in September 2026?

No. Google’s own timeline says the first enforcement phase starts on September 30, 2026 in Brazil, Indonesia, Singapore, and Thailand, with global rollout in 2027 and beyond.

Does the policy apply only to Google Play apps?

No. Google says the rule applies to apps installed on certified Android devices regardless of the app’s download source. That includes direct downloads and third-party stores.

What is a certified Android device in this context?

Google’s documentation says developer verification is enforced on certified Android devices. That is the class of devices Google recognizes under its certification framework, not Android hardware in the abstract.

What will outside-Play developers have to do?

They must create an Android Developer Console account, verify identity, and register package names. Google says package registration links app identifiers to signing keys.

Will developers have to submit government ID?

Often, yes. Google says developers may need to upload official government ID, and the Android Developer Console guide says individuals must submit government-issued photo ID and proof of address.

Is there a fee?

Yes for full distribution outside Play. Google’s Android Developer Console guide says account creation includes a $25 USD fee. The limited-distribution account for students and hobbyists is free.

What is Google’s limited-distribution option?

It is a free account type aimed at students and hobbyists. Google says it allows app sharing to up to 20 explicitly authorized devices without full verification requirements.

Does limited distribution preserve Android’s old openness?

Not really. It preserves a narrow learning and personal-sharing path, but it does not preserve open-ended public distribution for small independent or open-source projects.

Can users still install apps from unverified developers?

Yes. Google’s FAQ says users can still install apps from unverified developers through the advanced flow, and developers can still use ADB.

What is the advanced flow?

It is Google’s one-time setup path for users who want to install unverified apps. It includes enabling developer mode, a coercion check, a restart, a one-day waiting period, and reauthentication.

Will the advanced flow make ordinary sideloading feel different?

Yes. Google is preserving the option, but it is wrapping that option in deliberate friction and warning-heavy design, which changes the default experience of installing software outside the registry.

Is ADB still allowed?

Yes. Google’s FAQ says ADB installs are not affected by the 24-hour waiting period and remain available for developers.

Do enterprise apps need verification?

Not in every case. Google says apps distributed through an organization store on managed devices do not need to complete the verification requirements, though Google still recommends registration for broader install scenarios.

Is Google reviewing the content of every app distributed outside Play?

Google says no. It describes the program as identity verification and package-name registration, not content review of outside-Play apps.

Does Play Protect already scan apps from outside Google Play?

Yes. Google’s Play Protect help page says it checks apps when installed, scans devices periodically, and can evaluate apps from outside Google Play.

Why do critics say this is also a competition issue?

Because the policy extends Google-controlled approval past Google Play and into app installation on certified devices. That concern lands in the middle of ongoing antitrust fights over Android app-store power, including the Epic case and Aptoide’s new lawsuit.

Is this the same as Apple’s EU trader rules?

No. Apple’s trader rules are tied to the EU App Store and the Digital Services Act. Google’s policy reaches apps installed on certified Android devices regardless of source in covered regions.

Does this kill F-Droid immediately?

No, not immediately. F-Droid can still exist, users can still use advanced flow or ADB, and rollout is staged. But F-Droid argues the long-term structure threatens its model and its users’ ability to install and update apps normally on certified devices.

Why should ordinary users care if they never sideload apps?

Because platform freedom is not only for people who use it every day. It shapes competition, developer diversity, repair of bad platform decisions, and the owner’s ultimate control over the device after purchase.

Author:
Jan Bielik
CEO & Founder of Webiano Digital & Marketing Agency

Google is turning Android into a permissioned platform
Google is turning Android into a permissioned platform

This article is an original analysis supported by the sources cited below

Android developer verification
Google’s main landing page for the program, covering scope, identity checks, distribution paths, and the rollout timeline.

A new layer of security for certified Android devices
Google’s original August 2025 announcement of developer verification and its first public timeline.

Android developer verification guide
Google’s overview guide explaining certified-device scope, milestones, and core concepts.

Frequently asked questions | Android developer verification
Google’s FAQ covering the advanced flow, ADB, hobbyist accounts, and enforcement details.

Register on Android Developer Console
Google’s guide for developers distributing outside Play, including ID and proof-of-address requirements.

Register for limited distribution on Android devices
Google’s documentation for the student and hobbyist path, including the 20-device cap.

Register on Google Play Console
Google’s guide for Play developers, including auto-registration details for existing apps.

Android developer verification: Balancing openness and choice with safety
Google’s March 2026 post explaining the advanced flow and its anti-coercion rationale.

Android developer verification: Rolling out to all developers on Play Console and Android Developer Console
Google’s April 2026 rollout update, including Android Developer Verifier and later milestones.

A guide to the Android Developer Console
Google’s PDF guide with account-creation details, including the fee for full distribution.

Use Google Play Protect to help keep your apps safe & your data private
Google’s support page describing Play Protect scanning, warnings, removals, and outside-Play app checks.

Understanding Android developer verification
Google’s help-center summary of the verification program for the Android Developer Console.

An Open Letter Opposing Android Developer Verification
F-Droid’s open letter arguing that the policy threatens open Android distribution.

F-Droid and Google’s Developer Registration Decree
F-Droid’s detailed case against the registry, with emphasis on transparency, reproducible builds, and platform control.

What We Talk About When We Talk About Sideloading
F-Droid’s follow-up essay on how the policy changes the meaning of “sideloading” and user choice.

An Open Letter to Google regarding Mandatory Developer Registration for Android App Distribution
The Keep Android Open coalition’s public letter to Google and regulators.

Application Gatekeeping: An Ever-Expanding Pathway to Internet Censorship
EFF’s argument that app-store gatekeeping creates censorship and database-risk problems beyond malware control.

Why Brave is opposing Google’s Android developer registry
Brave’s critique of the privacy and developer-safety risks created by mandatory identity registration.

Nextcloud signs open letter against Android developer verification
Nextcloud’s publication of the open letter and its framing of the issue as a threat to openness and sovereignty.

#KeepAndroidOpen
AdGuard’s support for the campaign and its concern about developer privacy and centralization.

Google will verify Android developers distributing apps outside the Play store
The Verge’s initial news report on the policy and rollout geography.

Google will let ‘experienced users’ keep sideloading Android apps
The Verge’s coverage of Google’s retreat from a stricter initial position and the new advanced flow.

Google’s new Android sideloading includes a mandatory waiting period
The Verge’s practical breakdown of the advanced flow and its 24-hour delay.

Google must crack open Android for third-party stores, rules Epic judge
The Verge’s report on Judge Donato’s injunction against Google’s Android app-store practices.

Google makes concessions to settle app store dispute with Epic Games
AP’s summary of the March 2026 Epic-Google settlement proposal and app-store changes.

An update regarding Google Play’s policies for developers serving users in the US
Google’s own support update explaining that the Epic settlement still required court action and that current policies remained in effect.

Google sued by rival app store Aptoide over alleged monopoly
Reuters’ report on Aptoide’s April 2026 antitrust lawsuit against Google.

Global Scams on the Rise: Over Half of Adults Worldwide Report Scam Encounters, 23% lost money
The Global Anti-Scam Alliance’s summary of its 2025 scam survey, cited by Google in defense of the advanced flow.

Manage European Union Digital Services Act trader requirements
Apple’s official documentation for EU trader-status verification on the App Store.

New requirement for apps on the App Store in the European Union
Apple’s announcement that apps without trader status were removed from the EU App Store until verified.