Google’s Advanced Protection Arrives on Android: Should You Use It?

2 weeks ago

With this week’s release of Android 16, Google added a new security feature to Android, called Advanced Protection. At-risk people—like journalists, activists, or politicians—should consider turning it on. Here’s what it does, and how to decide if it’s a good fit for your security needs.

To get some confusing naming schemes clarified at the start: Advanced Protection is an extension of Google’s Advanced Protection Program, which protects your Google account from phishing and harmful downloads, and is not to be confused with Apple’s Advanced Data Protection, which enables end-to-end encryption for most data in iCloud. Instead, Google's Advanced Protection is more comparable to the iPhone’s Lockdown Mode, Apple’s solution to protecting high risk people from specific types of digital threats on Apple devices.

Advanced Protection for Android is meant to provide stronger security by: enabling certain features that aren’t on by default, disabling the ability to turn off features that are enabled by default, and adding new security features. Put together, this suite of features is designed to isolate data where possible, and reduce the chances of interacting with unsecure websites and unknown individuals.

For example, when it comes to enabling existing features, Advanced Protection turns on Android’s “theft detection” features (designed to protect against in-person thefts), forces Chrome to use HTTPS for all website connections (a feature we’d like to see expand to everything on the phone), enables scam and spam protection features in Google Messages, and disables 2G (which helps prevent your phone from connecting to some Cell Site Simulators). You could go in and enable each of these individually in the Settings app, but having everything turned on with one tap is much easier to do.

Advanced Protection also prevents you from disabling certain core security features that are enabled by default, like Google Play Protect (Android’s built-in malware protection) and Android Safe Browsing (which safeguards against malicious websites).

But Advanced Protection also adds some new features. Once turned on, the “Inactivity reboot” feature restarts your device if it’s locked for 72 hours, which prevents ease of access that can occur when your device is on for a while and you have settings that could unlock your device. By forcing a reboot, it resets everything to being encrypted and behind biometric or pin access. It also turns on “USB Protection,” which makes it so any new USB connection can only be used for charging when the device is locked. It also prevents your device from auto-reconnecting to unsecured Wi-Fi networks.

As with all things Android, some of these features are limited to select devices, or only phones made by certain manufacturers. Memory Tagging Extension (MTE), which attempts to mitigate memory vulnerabilities by blocking unauthorized access, debuted on Pixel 8 devices in 2023 is only now showing up on other phones. These segmentations in features makes it a little difficult to know exactly what your device is protecting against if you’re not using a Pixel phone.

Some of the new features, like the ability to generate security logs that you can then share with security professionals in case your device is ever compromised, along with the aforementioned insecure network reconnect and USB protection features, won’t launch until later this year.

It’s also worth considering that enabling Advanced Protection may impact how you use your device. For example, Advanced Protection disables the JavaScript optimizer in Chrome, which may break some websites, and since Advanced Protection blocks unknown apps, you won’t be able to side-load. There’s also the chance that some of the call screening and scam detection features may misfire and flag legitimate calls.

How to Turn on Advanced Protection

Advanced Protection is easy to turn on and off, so there’s no harm in giving it a try. Advanced Protection was introduced with Android 16, so you may need to update your phone, or wait a little longer for your device manufacturer to support the update if it doesn’t already. Once you’re updated, to turn it on:

  • Open the Settings app.
  • Tap Security and Privacy > Advanced Protection, and enable the option next to “Device Protection.” 
  • If you haven’t already done so, now is a good time to consider enabling Advanced Protection for your Google account as well, though you will need to enroll a security key or a passkey to use this feature.

We welcome these features on Android, as well as the simplicity of its approach to enabling several pre-existing security and privacy features all at once. While there is no panacea for every security threat, this is a baseline that improves the security on Android for at-risk individuals without drastically altering day-to-day use, which is a win for everyone. We hope to see Google continue to push new improvements to this feature and for different phone manufacturer’s to support Advanced Protection where they don’t already.

Thorin Klosowski

EFF to NJ Supreme Court: Prosecutors Must Disclose Details Regarding FRT Used to Identify Defendant

2 weeks ago

This post was written by EFF legal intern Alexa Chavara.

Black box technology has no place in the criminal legal system. That’s why we’ve once again filed an amicus brief arguing that the both the defendant and the public have a right to information regarding face recognition technology (FRT) that was used during an investigation to identify a criminal defendant.

Back in June 2023, we filed an amicus brief along with Electronic Privacy Information Center (EPIC) and the National Association of Criminal Defense Lawyers (NACDL) in State of New Jersey v. Arteaga. We argued that information regarding the face recognition technology used to identify the defendant should be disclosed due to the fraught process of a face recognition search and the many ways that inaccuracies manifest in the use of the technology. The New Jersey appellate court agreed, holding that state prosecutors must turn over detailed information to the defendant about the FRT used, including how it works, its source code, and its error rate. The court held that this ensures the defendant’s due process rights with the ability to examine the information, scrutinize its reliability, and build a defense.

Last month, partnering with the same organizations, we filed another amicus brief in favor of transparency regarding FRT in the criminal system, this time in the New Jersey Supreme Court in State of New Jersey v. Miles.

In Miles, New Jersey law enforcement used FRT to identify Mr. Miles as a suspect in a criminal investigation. The defendant, represented by the same public defender in Arteaga, moved for discovery on information about the FRT used, relying on Arteaga. The trial court granted this request for discovery, and the appellate court affirmed. The State then appealed to the New Jersey Supreme Court, where the issue is before the Court for the first time.

As explained in our amicus brief, disclosure is necessary to ensure criminal prosecutions are based on accurate evidence. Every search using face recognition technology presents a unique risk of error depending on various factors from the specific FRT system used, the databases searched, the quality of the photograph, and the demographics of the individual. Study after study shows that facial recognition algorithms are not always reliable, and that error rates spike significantly when involving faces of people of color,  especially Black women, as well as trans and nonbinary people.

Moreover, these searches often determine the course of investigation, reinforcing errors and resulting in numerous wrongful arrests, most often of Black folks. Discovery is the last chance to correct harm from misidentification and to allow the defendant to understand the evidence against them.

Furthermore, the public, including independent experts, have the right to examine the technology used in criminal proceedings. Under the First Amendment and the more expansive New Jersey Constitution corollary, the public’s right to access criminal judicial proceedings includes filings in pretrial proceedings, like the information being sought here. That access provides the public meaningful oversight of the criminal justice system and increases confidence in judicial outcomes, which is especially significant considering the documented risks and shortcomings of FRT.

Hannah Zhao

APC at the Internet Governance Forum (IGF) 2025

2 weeks ago
This edition of IGF is a vital opportunity to amplify our commitment to the World Summit on the Information Society, currently undergoing its 20-year review. This page is your go-to resource for this…
APCNews

【Bookガイド】6月の“推し本”紹介=萩山 拓(ライター)

2 weeks 1 day ago
 ノンフィクション・ジャンルからチョイスした本の紹介です(刊行順・販価は税別)◆小倉紀蔵『日本群島文明史』ちくま新書 6/11刊 1400円 日本は、大陸文明的な実体系思考よりも、海に囲まれた群島文明的な非実体系思考が優勢である。そうした世界観から、日本文明が創り出されてきた。生命は偶発的なものという感覚や共同主観の構造、革新性をもたらす美意識などが展開され、そうした日本の歴史的動態を描きつつ、日本の群島文明を形成する東アジアの哲学を「通底哲学」として世界哲学の中に置き直す。..
JCJ

Protecting Minors Online Must Not Come at the Cost of Privacy and Free Expression

2 weeks 1 day ago

The European Commission has taken an important step toward protecting minors online by releasing draft guidelines under Article 28 of the Digital Services Act (DSA). EFF recently submitted feedback to the Commission’s Targeted Consultation, emphasizing a critical point: Online safety for young people must not come at the expense of privacy, free expression, and equitable access to digital spaces.

We support the Commission’s commitment to proportionality, rights-based protections, and its efforts to include young voices in shaping these guidelines. But we remain deeply concerned by the growing reliance on invasive age assurance and verification technologies—tools that too often lead to surveillance, discrimination, and censorship.

Age verification systems typically depend on government-issued ID or biometric data, posing significant risks to privacy and shutting out millions of people without formal documentation. Age estimation methods fare no better: they’re inaccurate, especially for marginalized groups, and often rely on sensitive behavioral or biometric data. Meanwhile, vague mandates to protect against “unrealistic beauty standards” or “potentially risky content” threaten to overblock legitimate expression, disproportionately harming vulnerable users, including LGBTQ+ youth.

By placing a disproportionate emphasis on age assurance as a necessary tool to safeguard minors, the guidelines do not address the root causes of risks encountered by all users, including minors, and instead merely focus on treating their symptoms.

Safety matters—but so do privacy, access to information, and the fundamental rights of all users. We urge the Commission to avoid endorsing disproportionate, one-size-fits-all technical solutions. Instead, we recommend user-empowering approaches: Strong default privacy settings, transparency in recommender systems, and robust user control over the content they see and share.

The DSA presents an opportunity to protect minors while upholding digital rights. We hope the final guidelines reflect that balance.

Read more about digital identity and the future of age verification in Europe here.

Jillian C. York

PGP Key

2 weeks 1 day ago
Public key for secure [at] statewatch.org

Fingerprint: F768123BA2AA95C46F089EE223D35335ECB2871C

-----BEGIN PGP PUBLIC KEY BLOCK----- xsDNBGhQLgsBDADltjtcvUSsqX8xu+epJgEG+7gYjzGJ1nq5B6pirJNs/U+D6H5r od5vKhDtQT8/5kTBCHvQh0W/LLduqrQ6vLuYTm0XuHaAWDHFdZAZSIcUTzZX1zs4 iI2OtHz7La5WQum9dV+Kt5sct+JYs9qTYJ/xNIFv3GQiOapV3kbzlw21rhs6wvMV FKr26I+8YcYgSIQL/Nej1WDfnD7LL2Iu3KEEjefcgfa/Btvqs2tow2Sr9BKDWVGg DDQim85FLh26YSudJu+qU2FUkc1/z6GZ8E7gfVp7y0NArhvuMePMP+an3homcXG5 /O4SI9PbtoBjA8b0xlsv0LUpQyYI99baUZ+z9x15uDdkyPDUuOoT1L1aIbxFt1gv ouVghGs2HgS4F26q0qxYHs+Gmy5y+3pEKDlxtyxHIh5qcd7k0RZehqWFnTSnbQX8 qKtlxyP1BbAlY1ptwHC3d+VXV8QFWzZh603KQTtphW5T4A/icj3LIIWKOB/inoTy LGkarUq2hFehdKsAEQEAAc0iU3RhdGV3YXRjaCA8c2VjdXJlQHN0YXRld2F0Y2gu b3JnPsLBDQQTAQgANxYhBPdoEjuiqpXEbwie4iPTUzXssoccBQJoUC4LBQkFo5qA AhsDBAsJCAcFFQgJCgsFFgIDAQAACgkQI9NTNeyyhxzVdQv+PUzkrCEA4hRp9b13 p0y1puaUElGIn0U5H0iWiWP2h5DPxcj4d8q6kBVOl9tmXHVaXpZ79l4AiFxA74QQ jM3O3h7Gquxj+npbBfmm/PVox6RKNIT8YliueUieB7XlQf03FIvrMcp39jcBIC8a Ru7ybIbdhDq5CVrwgCHHdZogRqfMm7p+74/4sbpBOQe/wCENpdj0GS0rIZC0kMwI noRdBBm2Mtse6p66NvteVuAtoFGxI3FAG3lOC6K5Pm1BivUwWxvGZQlIqYM+Kc/F EFt0OdA0PwV+q8oByZeMoeqm65wZ6hNJBueVKbfYlEgaxElXJJ5HA2yEV7DNtQZT 0gRabpb1cmZzczfq6537btn3t+zzmX/baHV+FeHclAzXTGKAwf4suI7SchqGu/nz qYah9C5sRJPFGv4J3IIZ613/G7y+C1H2rIxbav5Imm3XoVpmbz+H8Fzy/H3NRJ9n b0OanE224Kw9SSgn4hKTL9oT5PuFwTE7SDwC2q7m2kunoZEIzsDNBGhQLgwBDADJ Vk6NYDH7L7bjuoPSzjsQkgOroUjT4vlkrNCh+d3hNbb4lfh33cql0rgEu+dTP2P4 uqlpBlfaEYpHpXeGOiuRRbrot3PtpJ7vN9J3sVgEYon9xiN5APgVnjHw0vqI5snx +11l5HnvM0UF1/oZvBO1Xb6YAWgccm977B/iDL/yjK1OrnduPZ8g/OjNrQUVfFkE wlwDzly0j0b876busmWdjFqSclMUgHd3y4KDkGEsETJ/xncwyieECS++zP7QfEi6 sfmT+ut2kVlMDOIDkQC/tl8ForLTGwmpCNFQpVhATyveDLcCxHiFarcaLpp0mMe5 a1wVuAyID8zPsoCokesy6ASlgE5O2odcs1opK1qvrY7FFkuV3cnVaXDIEioHr4cL eQxpS7dc0erx509hQFSTZwm7mbTbuv7VK4EYrdlCdzEXID6vBNGLkgL+qNb45/4i Gjs9rnJfizUx2yEhrBOWee7iX8bj9WOatWXAj83xefjI2jKWPiWWRsbjpbu2v/EA EQEAAcLA/AQYAQgAJhYhBPdoEjuiqpXEbwie4iPTUzXssoccBQJoUC4MBQkFo5qA AhsMAAoJECPTUzXssocctNIL/2rYWWm6QDuzAc9xLDwPIaC/fMYn04SHblZr8vc5 WOXwrpbguOAjmG+oyJk/d00NXfTWlOOJKh89dyHOIMX/w6n6UkjJ8rNUAYd233EB 9HHbn1QA7jJJDxT/XDe7v+hhR3xalNOdAQsj+9Wo4oQuf+fZbtvDwXkk5d29cZf1 FW8k9i8LvNCtJCDUTiyRPmStv6o9xTa9cLUETy4/cz1//+UZsx+JObyWNL3VBGUJ 4F+qDlXqfGY3Ff5MD7J+s+kVlH1XDBmVx/US8/JwYaWZjn5psXiei3fCTm+mNTgH r6FlFYGAR0up3N3W7fDQZBLoAUdrFzbsedt5nlytK6NzKLigZvzeoMiVxbkAIxxU 2NM4g7qVShZmbvmU9HrJe5UUlOa01w69JF1kBI0xIHh6KryuZeHt4QRpvdE7yxWH pblLcqgqZ33sEmrETeU4HxSo/O+0OgsrErGfohkz3CL5peajgOmTimo9DePndpkL TgqHTnYRmf7YUa9Nb6nTOKoM6A== =2rwV -----END PGP PUBLIC KEY BLOCK-----
justin