Google’s Updated Sideloading Regulations for Android Applications Could Let Down Users

cut off sideloading as you are familiar with it by compelling developers to authenticate their apps for installation on the majority of Android devices. Nevertheless, back in November 2025, Google re-emerged, stating it would permit “experienced” Android users to sideload applications by implementing an opt-in system of some sort.

Fast forward a few months, and you finally gain a clear insight into what to anticipate from Android’s significant sideloading modifications, courtesy of Google’s recent blog post. The revamped system is based on what Google refers to as an “advanced flow,” which it claims will “protect against coercion.” The essence of this configuration is supposedly centered around user selection, with three primary methods to sideload apps utilizing the new framework.

The advanced flow will only be activated in one of three potential scenarios, with the initial two permitting verified applications to be sideloaded directly from the developer, without altering the existing system. Users will also have the option to sideload directly from developers with restricted distribution settings, indicating that the outlets where their app is accessible will be regulated in some manner. Lastly, the third option will engage the advanced flow to facilitate sideloading from unverified sources.

Google’s advanced flow

If you wish to sideload applications from unverified developers, you will now have to navigate a multi-step procedure to enable sideloading. This procedure initially requires you to activate developer mode on your Android device. Following that, you can verify that you aren’t being deceived or coerced. This second step is crucial as it helps to ensure that users aren’t being compelled to install malware by fraudsters. Once you confirm you aren’t being

Google Reveals New Exploit Sequence Aiming at Obsolete iPhones

Following its recent announcement regarding the Coruna exploit chain that targets older iOS versions, the company has now disclosed a comparable attack thought to be named DarkSword. Here are the specifics.

## A Few More Reasons to Keep Your Devices Updated

Several weeks ago, Google and iVerify released two reports that provided complementary insights on the Coruna exploit, which exploited multiple iOS vulnerabilities to compromise iPhones operating on outdated system versions.

In the wake of the reports, Apple issued iOS 16.7.15, iOS 15.8.7, iPadOS 16.7.15, and iPadOS 15.8.7, fixing kernel and WebKit vulnerabilities exploited by Coruna.

Notably, earlier today, Apple released a new support document titled “Update iOS to protect your iPhone from web attacks,” stating that “security researchers recently discovered web-based attacks that target outdated versions of iOS through harmful web content.” The document outlines the following:

– If you have kept your iPhone software current, you are already protected. If your iPhone is running an older version of iOS, please update to safeguard your data:
– Devices running the latest, updated versions of iOS 15 through iOS 26 are already secured. If you have not updated your software in a while, update iOS on your iPhone.
– On March 11, 2026, we released a software update for iOS 15 and iOS 16 to extend protection to older devices that cannot upgrade to the newest version of iOS.
– Devices with iOS 13 or iOS 14 must upgrade to iOS 15 to receive these protections and will be notified to install a Critical Security Update in the coming days.
– Apple Safe Browsing in Safari is enabled by default and blocks the malicious URL domains identified in these attacks.

*Note: Users unable to update their device may consider activating Lockdown Mode (if available) to guard against harmful web content and other threats.*

It appears that the new Security post might refer not only to Coruna but also to another exploit chain, which the Google Threat Intelligence Group (GTIG) believes to be called DarkSword.

According to GTIG, “multiple commercial surveillance vendors and suspected state-sponsored actors are utilizing DarkSword in various campaigns,” adding that “these threat actors have employed the exploit chain against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine.”

In summary, DarkSword operates similarly to Coruna. It chains multiple vulnerabilities to achieve a complete kernel-level compromise.

Like Coruna, DarkSword is distributed through compromised or decoy websites, then chains multiple stages before deploying payloads such as GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER.

According to GTIG, the CVEs related to DarkSword include:

– CVE-2025-31277 (patched in iOS 18.6)
– CVE-2026-20700 (patched in iOS 26.3)
– CVE-2025-43529 (patched in iOS 18.7.3 and iOS 26.2)
– CVE-2025-14174 (patched in iOS 18.7.3 and iOS 26.2)
– CVE-2025-43510 (patched in iOS 18.7.2 and iOS 26.1)
– CVE-2025-43520 (patched in iOS 18.7.2 and iOS 26.1)

To delve into the technical specifics, refer to GTIG’s report, published in collaboration with Lookout and iVerify, both of which also released their discoveries.

Oh, and ensure that your devices are operating on the latest iOS version.