Unverified Android Apps Will Soon Stop Working On Most Devices - 1

Image by Pathum Danthanarayana, from Unsplash

Unverified Android Apps Will Soon Stop Working On Most Devices

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

Google is preparing a major security change for Android apps that could reshape how software is distributed across its ecosystem.

In a rush? Here are the quick facts:

  • Google compares the new system to “an ID check at the airport.”
  • Rollout begins in 2026, starting in Brazil, Indonesia, Singapore, and Thailand.
  • Critics say the plan could give Google more control over app distribution.

On Monday the company announced plans to start verifying the identities of all app developers, including those who distribute apps outside the Play Store . In the coming years, apps without verified developers will not work on most Android devices.

Google compared the process to “an ID check at the airport.” The company already requires Play Store developers to verify their identities, a move it says has sharply reduced malware and fraud. Now, it wants to extend the system to sideloaded apps, which Google claims are “50 times more likely to contain malware.”

ArsTechnica reports Android Developer Console will receive a simplified version for outside applications as part of Google’s launch. Developers must register their app package names and signing keys after verification. The developer identity verification process will be the only requirement for Google since the company says it will not review app content or functionality.

Google plans to test the new system in October, open it to all developers by March 2026, and roll it out in Brazil, Indonesia, Singapore, and Thailand starting September 2026. A global rollout could follow in 2027.

ArsTechnica notes that this comes where Epic Games has filed an antitrust lawsuit against Google which could force the company to reduce its control over app distribution. The courts have already ordered Google to enable third-party app stores and app rehosting. While this increases choice, it also raises security risks from apps installed outside the Play Store.

Recently, fake Google Play pages are tricking Android users into downloading SpyNote malware . The malicious apps enable spying, data theft, and remote control, mimicking real Play Store listings.

Researchers say attackers use newly registered domains and hidden APKs to infect devices. Experts warn removal often requires a factory reset.

However ArsTechnica reports that critics warn that the new verification system could act as a heavy-handed gatekeeper, giving Google more control as competition in app distribution grows.

For now, though, the company insists its aim is to protect users from harmful software.

CBP Quietly Used Flock’s Camera System For Nationwide Vehicle Tracking - 2

Image by Criphc, from Unsplash

CBP Quietly Used Flock’s Camera System For Nationwide Vehicle Tracking

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

The Customs and Border Protection (CBP) organization gained access to more than 80,000 automated license plate reader (ALPR) cameras operated by Flock Safety.

In a rush? Here are the quick facts:

  • Flock cameras track license plates, models, colors, and timestamps.
  • Boulder Police said it unknowingly shared data with CBP through Flock.
  • Flock CEO admitted poor communication and paused all federal pilot programs.

According to records obtained by 404 Media and local outlets, it was shown that CBP performed extensive searches across the United States, raising new concerns about federal surveillance activities.

404 Media notes that Flock’s cameras, often promoted as local tools to fight car theft or property crime, have been quietly linked into a national network. The network operates by recording license plate numbers, vehicle model information together with the time stamps of passing vehicles.

The newly released data by 404Media demonstrates CBP had direct access to the network for searches, without needing local police to act as intermediaries.

In one case, 404Media reports that Boulder Police Department said it “does not have any agreement with U.S. Border Patrol for Flock searches” and claimed it wasn’t aware CBP was accessing its data. The department has since disabled the feature that allowed nationwide lookups.

A spokesperson for Flock confirmed to 404 Media that “Flock has paused all federal pilots.” In a blog post, CEO Garrett Langley admitted the company failed to set “distinct permissions and protocols in the Flock system to ensure local compliance for federal agency users.”

He said Flock would now mark federal agencies separately to give local departments clearer control.

However, internal dissent remains. One Flock employee told 404 Media the company “will defend it as they have been by saying Flock follows the law,” but raised concerns that shifting U.S. laws could expand federal access further.

404Media reports that the audit logs demonstrate that CBP performs camera searches that extend beyond the scope of local department searches. The number of networks that CBP accessed on June 13 reached 6,429 while other agencies accessed 6,049 networks.

404 Media says CBP has not responded to requests for comment.