I solved this problem by changing my application package name according to signature certificate details. At first I created application with com.foo.xyzbut my certificate organization was 'bar'. So I change my package name to com.bar.xyz and now there is no google play protect warning!
Disabling Play Protect will disable the malware protection from Google Play. As such, to maintain security levels, we do not recommend turning off Play Protect and recommend that you keep it on at all times.
no you are wrong i have installed neo store and bromite from outside but it never ask for this minsdk stuff
i am sure there is a issue i can confirm with chromium from csagan and installed the same way i installed fdroid but the playprotect error only come up in fdroid
7201280 38.1 KB
You just have click on ( install Anyway ) otherwise it will block this for installation because play protect does not recognize the app developer before publishing the app.
Try installing this app on another device or publish it and then install it from playstore. or simply reset your device.
In addition to a lightweight, daily, automatic scan, users can start a full-device scan at any time. Upon request, the device contacts Google servers for the latest information and scans all apps on the device. If a harmful app is discovered, Google Play Protect notifies the user to take action or takes action on their behalf. This visibility gives users peace of mind that they have the latest protection at all times.
Google Play Protect offers protection for apps that are installed from sources outside of Google Play. When a user tries to install an app, Play Protect conducts a real-time check of the app against known harmful or malicious samples that Google Play Protect has cataloged.. The app is also checked by on-device machine learning, similarity comparisons and other techniques to confirm if it's suspicious. If the app is identified as malicious or suspicious, we will warn users or block the installation in extreme cases.
Google Play Protect also offers new protections for emerging threats that were previously not scanned before. When Play Protect does not recognize any malicious code from the collected samples, it recommends a real-time code-level scan of the app to extract important signals for evaluation by Google. This helps combat novel malicious apps that may have been altered to avoid detection. If a user agrees to scan the app, they will upload the app data to Google for analysis. A short time later, Play Protect will let users know if the app appears safe to install or is potentially harmful.
The stats go as far as the beginning of 2017 because that's when Google Play Protect was introduced, during the Google I/O 2017 on May 17, 2017, with Google starting full deployment of the built-in malware protection to all Android devices during July 2017.
In 2019, Google worked on strengthening policies to better protect families and children and joined efforts with ESET, Lookout, and Zimperium through the App Defense Alliance to improve malicious Android app detection on submission blocking them before they get published on the Play Store.
Google is also committed to investing more to protect the security of Android devices by strengthening app safety policies designed to protect users' privacy, by blocking repeat offenders and detecting bad actors faster, as well as identifying and removing Android apps featuring harmful content and behaviors.
Below is a screenshot that shows the error:
_2023-07-13_01-22-10.jpg/file
(Although the "Install Anyway" option is there, we don't want this error to be displayed because it makes the user feel insecure and we face problems in presenting it in other markets.)
Malicious apps were reportedly installed on Android phones via non-Google app stores, as well as online gambling and adult websites. Deemed unsafe for users, the apps were detected and blocked by Google Play Protect.
Google Play Protect, a malware protection system that comes pre-installed on official Android devices, has blocked more than 1.9 billion malicious app installs that originated from unofficial (non-Google) sources in 2019, such as third-party app stores.
Second, it can also mean that more Android users are being tricked into installing malware-infected apps from outside the Play Store, or are now using third-party app stores to get their apps as they're being blocked from accessing the official store.
This article describes the app protection policy settings for Android devices. The policy settings that are described can be configured for an app protection policy on the Settings pane in the portal.There are three categories of policy settings: data protection settings, access requirements, and conditional launch. In this article, the term policy-managed apps refers to apps that are configured with app protection policies.
There are some exempt apps and services from which Intune may allow data transfer. See Data transfer exemptions for a full list of apps and services.All apps