Android System SafetyCore
⚠️ Article status notice: This article has been marked as incomplete
This article needs additional work for its sourcing and verifiability to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. In particular:
- The incident is based mostly on speculation and (warranted) suspiciousness with Google's actions. More sources are needed or change of scope/deletion of the incident.
- This is currently formatted as a product page, it may be a candidate to turn into an incident
This notice will be removed once the issue/s highlighted above have been addressed and sufficient documentation has been added to establish the systemic nature of these issues. Once you believe the article is ready to have its notice removed, please visit the Moderator's noticeboard, or the discord and post to the #appeals channel.
Learn more ▼
Android System SafetyCore is an app developed and released by Google for the Android platform. According to Google the software provides locally-run nudity censoring for any Android devices running version 9 (pie) or later.[1]
Consumer impact summary
User Freedom: Can be uninstalled, however a lack of communication and difficulty to find the installed app should call this freedom into question.
User Privacy: Claimed to "only scan files sent on messages app"[1]
Incidents
This is a list of all consumer protection incidents related to this product. Any incidents not mentioned here can be found in the .
Installation without informed consent (January 22, 2025)
In January 22, 2025, Google quietly rolled out Android System SafetyCore to all Android devices. The installation of the program neither informed consumers that it was installed, nor did it request consumers to install it onto their devices.[2][3] This additionally bypassed any features consumers have enabled that blocks installations of programs without consumer approval first.
Due to a lack of both transparency or open sourcing, it has brought significant amounts of concern from consumers, especially those who work in tech security. [4][5][6][7] With Google directly stating that the program scans photos that are sent on the messages app, it has set a precedent for this concern as well, since malicious actors or Google themselves could theoretically hijack this product for illicit purposes, such as setting the app to scan for more than just mature photos, or scanning files beyond just what the messages app is allowed.
This lack of transparency has been also cited as a concern from GrapheneOS maintainers, stating that because it is not open source, they will not be including the app inside their operating system.[8]
See also
References
- ↑ 1.0 1.1 "5 new protections on Google Messages to help keep you safe". Google Security Blog. 22 Oct 2024. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ Thitu, Naftary (10 Feb 2025). "Rogue or Safe App? Unmasking Android System SafetyCore". techweez. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Android System SafetyCore". Reddit. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Android System SafetyCore: Hidden Installation and What You Should Know". ProtectStar. 11 Feb 2025. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Guys help some app called android system safetycore installed automatically". Reddit. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ @dancytron (8 Feb 2025). "Android System SafetyCore". Puppy Linux Discussion Forum. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link) - ↑ @Phosphate5 (12 Feb 2025). "Android System SafetyCore is being silently installed on android devices". Artix Linux Forum. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: numeric names: authors list (link) CS1 maint: url-status (link) - ↑ @GrapheneOS (8 Feb 2025). "The functionality provided by Google's new Android System SafetyCore app". X. Retrieved 15 Apr 2025.
{{cite web}}: CS1 maint: url-status (link)