Android System SafetyCore
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
Android System SafetyCore is a program developed and released by Google for the Android platform. Google claims that the software provides locally-run nudity censoring for any Android devices running version 9 (pie) or later.[1]
Due to a lack of both transparency or open sourcing, it has brought significant amounts of concern from consumers, especially those who work in tech security. [2][3][4][5] With Google directly stating that the program scans photos that are sent on the messages app, it has set a precedent for this concern as well, since malicious actors or Google themselves could theoretically hijack this product for illicit purposes, such as setting the app to scan for more than just mature photos, or scanning files beyond just what the messages app is allowed.
This lack of transparency has been also cited as a concern from GrapheneOS maintainers, stating that because it is not open source, they will not be including the app inside their operating system.[6]
Consumer impact summary
User Freedom: Can be uninstalled, however a lack of communication and difficulty to find the installed app should call this freedom into question.
User Privacy: Unknown, claimed to "only scan files sent on messages app"[1]
Business Model: Unknown, claimed to be freeware that censors nudity
Market Control: Absolute
Incidents
This is a list of all consumer protection incidents related to this product. Any incidents not mentioned here can be found in the Android System SafetyCore category.
Installation without informed consent (January 22, 2025)
In January 22, 2025, Google quietly released Android System SafetyCore to all Android devices. The installation of the program neither informed consumers that it was installed, nor did it request consumers to install it onto their devices.[7][8] This additionally bypassed any features consumers have enabled that blocks installations of programs without consumer approval first.
See also
- Android
References
- ↑ 1.0 1.1 https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
- ↑ https://www.protectstar.com/en/blog/android-system-safetycore-hidden-installation-and-what-you-should-know
- ↑ https://www.reddit.com/r/antivirus/comments/1gpdhwz/guys_help_some_app_called_android_system/
- ↑ https://forum.puppylinux.com/viewtopic.php?p=142400
- ↑ https://forum.artixlinux.org/index.php/topic,7782.msg46658.html
- ↑ https://x.com/GrapheneOS/status/1888280836426084502?mx=2 "Neither this app or the Google Messages app using it are part of GrapheneOS and neither will be, but GrapheneOS users can choose to install and use both. Google Messages still works without the new app." "It's unfortunate that it's not open source and released as part of the Android Open Source Project and the models also aren't open let alone open source. It won't be available to GrapheneOS users unless they go out of the way to install it."
- ↑ https://techweez.com/2025/02/07/hidden-guardian-or-unwanted-intruder-unmasking-android-system-safetycore/
- ↑ https://www.reddit.com/r/antivirus/comments/1iih2ll/android_system_safetycore/