Security9 min readThe Hacker News

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

P
Redakcja Pixelift1 views
Share
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Foto: The Hacker News

Google introduces mandatory 24-hour delay when installing apps from unverified sources on Android. The new procedure aims to reduce the number of malicious programs and fraud while maintaining the openness of the ecosystem. The change represents an expansion of developer verification requirements that Google announced a year earlier — all apps must be registered by verified creators. The waiting period is intended to give users time for reflection before installing apps outside the official Play Store, which is particularly important for less experienced users. The solution balances the flexibility of sideloading with security — advanced users can still install apps from alternative sources, but with an additional time barrier. This is a practical approach to the growing problem of malware spreading through unofficial distribution channels.

Google has just implemented one of the most controversial security measures in Android's history — a mandatory 24-hour waiting period before installing applications from unverified sources. This is not a typical security update. This is a fundamental change in how the operating system treats user autonomy, and it sends a clear signal that even industry giants are beginning to treat openness as a threat that requires control.

Google's decision reveals a deep tension in the mobile ecosystem. On one hand, we have the promise of an open system that allows users to install software from outside the official store. On the other hand, we have frightening statistics — the number of malicious applications on Android is growing faster than the number of legitimate ones, and fraud related to fake applications costs users billions of dollars annually. Google is trying to solve this problem, but the path it has chosen has serious consequences for the entire ecosystem.

This is not purely a technical issue. This is a political, economic, and ideological issue — and the way Google solves it will impact every developer, every user, and every competitor in the mobile world.

How the new 24-hour waiting system works

Google's new "advanced flow" introduces a simple, but radical mechanism. When a user tries to install an application from an unverified source — essentially from anywhere outside the Google Play Store — the system will display a warning and enforce a 24-hour waiting period. During this time, the application will not be installed, regardless of whether the user is confident in their decision.

This solution resembles the "cooling-off period" system known from e-commerce, where consumers have the right to withdraw from a contract within a specified time. Except here, it's not about withdrawal — it's about artificially prolonging the decision-making process. Google argues that this gives time for the application to be verified by security systems, but in reality it means that every user wanting to install an application must wait, regardless of circumstances.

The mechanism includes several layers of protection. First, the application is scanned by Google's algorithms for known threats. Second, the system checks the developer's reputation. Third, if the application passes all checks, the user must wait. This is a combination of automation and artificial delay — a combination that works well in reducing impulsive decisions, but also has many unintended consequences.

Context: What problem is Google trying to solve

To understand why Google made this decision, you need to look at the reality of threats in the Android ecosystem. Sideloading — installing applications from sources outside the official store — is the main attack vector for malicious software. Research shows that approximately 40% of all malicious applications on Android come from sideloading, not from the Google Play Store.

The problem is compounded when we consider fraud. Cybercriminals create copies of popular applications — banks, messengers, payment platforms — and distribute them through third-party websites, SMS messages, or social media. Unsuspecting users download these fakes, enter their login credentials, and hackers take over accounts. This is a simple, but brutal method that works on a massive scale.

The Google Play Store has its own verification systems, but even there, malicious applications sometimes slip through. Outside the store, there are practically no controls. A user downloads an APK file from an unknown source, installs it, and hopes it won't be a trojan or spyware. This is roulette.

Governments are also pressuring Google. The European Union, the United States, and other jurisdictions are forcing tech companies to take greater responsibility for security. If an application infected with malware passes through Android, Google can be held liable. The 24-hour waiting period is, in a sense, insurance — proof that Google is doing something active.

Developer verification as part of a broader strategy

The new sideloading system doesn't exist in a vacuum. This is part of Google's broader initiative from last year — mandatory developer verification for all applications on Android. This means that anyone who wants to publish applications must go through an identity verification process, provide supporting documents, and sometimes even undergo biometric verification.

This is a fundamental change. Previously, theoretically, anyone could create a Google Play Store account and publish an application. Now, to even start, you must be a verified developer. This raises the barrier to entry, but at the same time reduces the number of fake accounts and malicious actors.

Developer verification makes sense from a security perspective. If you know that every developer is a real person with confirmed identity, it becomes much harder to distribute malicious software at scale. But it also has a side effect — it reduces the number of independent developers, especially from countries with less formal structures, who cannot or do not want to go through verification.

Where the conflict between security and openness lies

The history of Android is a history of tension between two visions. On one hand, Android was supposed to be an open operating system — a platform where users have full control over their devices. On the other hand, Google always needed security to protect users from malicious software and fraud.

For many years, these two visions coexisted. Users had the ability to sideload, but it was disabled by default and required a few clicks to enable. This was a compromise — security for most, openness for advanced users. Now, that compromise is changing.

The 24-hour waiting period is not an obstacle for advanced users — they can wait anyway. It is an obstacle for regular users who want to quickly install an application that someone recommended to them. This changes sideloading from "an option for advanced users" to "an option for the patient".

The conflict deepens when we consider applications alternative to the Google Play Store. There are app stores, such as F-Droid or Amazon Appstore, that offer open-source applications or have different business models than Google. Users who want to use these alternative stores now have to wait 24 hours for each installation. This is effectively a penalty for using alternatives.

Implications for developers and the application ecosystem

For independent developers, this change is bad news. If your application is not in the Google Play Store — and maybe it isn't because Google rejected it because it's too niche, or because you don't want to pay fees — now you have a much bigger obstacle to overcome. The 24-hour waiting period is not just an inconvenience — it is a barrier that reduces user conversion and engagement.

Imagine this scenario: a user wants to install an application that a friend recommended. Previously, they clicked on a link, downloaded the file, installed it and done. Now, they click on a link, download the file, wait 24 hours, and then install. In that time, they might forget about the application, might change their mind, might find an alternative in the Google Play Store.

This also has implications for specific categories of applications. Educational applications, developer tools, applications for specific countries or communities — all of these may be more accessible through sideloading than through the official store. Now, all of these have restricted access for users.

Developers will pressure to get their applications into the Google Play Store, which means more Google control over the ecosystem. This is a spiral — the more barriers to sideloading, the more applications end up in the official store, the more control Google has.

Comparison with other platforms and global trends

Apple has always taken a more restrictive path. iPhones cannot sideload applications (with some recent exceptions in the European Union), and the App Store is the only official source. This gave Apple enormous control over the ecosystem, but also led to accusations of monopoly and anti-competitive practices.

Google, for years, positioned itself as an alternative — more open, more flexible. But now, Google is slowly moving toward Apple's model. The 24-hour waiting period is a step in that direction. It's not yet a complete ban on sideloading, but it's a clear signal that openness is no longer a priority.

In Europe, regulations such as the Digital Markets Act are forcing Apple to allow sideloading. Google, on the other hand, is introducing barriers that actually make sideloading more difficult without formally banning it. This is clever — a technical regulatory workaround that achieves the goal without violating the letter of the law.

Other platforms, such as Windows or macOS, never had such restrictions. You can install software from any source, although the system warns you about untrusted sources. But Android, being a system for mobile devices, which traditionally had fewer security threats, is now adopting a model more reminiscent of personal computers — but with greater control.

Real impact on user security

The question everyone should ask is: does the 24-hour waiting period actually reduce security threats? The answer is ambiguous. On one hand, if a user has time to think, they might change their mind and not install a suspicious application. On the other hand, if a hacker wants to infect a device, they can simply wait 24 hours — this poses no obstacle to a planned attack.

The real impact will be visible in statistics. If the number of malware infections drops by 50%, that would suggest that the waiting period is effective. But if the number drops by 5%, it means the main effect is simply reducing the number of sideloads, not reducing the number of malicious applications among those sideloads.

Much suggests it will be the latter. Advanced users will wait. Regular users will give up on sideloading. But the number of malicious applications among those that will be installed will probably not change drastically.

The real problem — fraud and malicious applications — requires more advanced solutions. Such as better real-time scanning, better reputation systems, better user education. The 24-hour waiting period is a band-aid on a bigger wound.

What this means for the future of Android and mobile

Google's decision signals a clear direction. Android is changing from a system that is "open with threats disabled by default" to a system that is "closed with threats optionally available". This is a fundamental change in philosophy.

In the longer term, we can expect Google to continue restricting sideloading. Maybe the next step is a 48-hour waiting period. Maybe then a 7-day one. Maybe eventually, sideloading will require special permission from Google, similar to iOS in the European Union.

This will have consequences for the entire ecosystem. Fewer alternative app stores. Fewer independent developers. More Google control over what applications can be installed. In a sense, Android will become increasingly similar to iOS — not because Google wants to be like Apple, but because security and control are more profitable than openness and flexibility.

For users, this means less choice. For developers, it means more dependence on Google. For competitors, it means Android ceases to be an alternative for those seeking openness. This is a change that will have long-term consequences for the entire mobile industry.

Comments

Loading...