Ten brand new artifacts in this wave:
androidx.compose.material3.adaptive:adaptive-navigation3-jvmstubs
androidx.compose.material3.adaptive:adaptive-navigation3-linuxx64stubs
androidx.compose.runtime:runtime-retain
(including mulitplatform artifacts)
androidx.credentials.registry:registry-digitalcredentials-openid
androidx.credentials.registry:registry-digitalcredentials-sdjwtvc
androidx.lifecycle:lifecycle-viewmodel-navigation3-jvmstubs
androidx.lifecycle:lifecycle-viewmodel-navigation3-linuxx64stubs
androidx.security:security-state-provider
androidx.xr.arcore:arcore-openxr
androidx.xr.arcore:arcore-testing
Beyond that, you can find the 869 new artifact versions here.
—Sep 24, 2025
Only one brand new artifact this time around: androidx.compose.ui:ui-tooling-preview-linuxx64stubs
.
Beyond that, you can find the ~750 new artifact versions here.
—Sep 10, 2025
This wave’s brand-new artifacts includes a tie between Nav3 and Material3; broader multiplatform
support for androidx.compose.runtime:runtime-saveable
, androidx.navigation3:navigation3-runtime
,
and androidx.paging:paging-compose
; plus a new android.text
group:
androidx.compose.material3.adaptive:adaptive-navigation3
androidx.compose.material3.adaptive:adaptive-navigation3-android
androidx.compose.runtime:runtime-saveable-iosarm64
androidx.compose.runtime:runtime-saveable-iossimulatorarm64
androidx.compose.runtime:runtime-saveable-iosx64
androidx.compose.runtime:runtime-saveable-js
androidx.compose.runtime:runtime-saveable-linuxarm64
androidx.compose.runtime:runtime-saveable-linuxx64
androidx.compose.runtime:runtime-saveable-macosarm64
androidx.compose.runtime:runtime-saveable-macosx64
androidx.compose.runtime:runtime-saveable-mingwx64
androidx.compose.runtime:runtime-saveable-tvosarm64
androidx.compose.runtime:runtime-saveable-tvossimulatorarm64
androidx.compose.runtime:runtime-saveable-tvosx64
androidx.compose.runtime:runtime-saveable-wasm-js
androidx.compose.runtime:runtime-saveable-watchosarm32
androidx.compose.runtime:runtime-saveable-watchosarm64
androidx.compose.runtime:runtime-saveable-watchosdevicearm64
androidx.compose.runtime:runtime-saveable-watchossimulatorarm64
androidx.compose.runtime:runtime-saveable-watchosx64
androidx.navigation3:navigation3-runtime-desktop
androidx.navigation3:navigation3-runtime-iosarm64
androidx.navigation3:navigation3-runtime-iossimulatorarm64
androidx.navigation3:navigation3-runtime-iosx64
androidx.navigation3:navigation3-runtime-js
androidx.navigation3:navigation3-runtime-linuxarm64
androidx.navigation3:navigation3-runtime-linuxx64
androidx.navigation3:navigation3-runtime-macosarm64
androidx.navigation3:navigation3-runtime-macosx64
androidx.navigation3:navigation3-runtime-mingwx64
androidx.navigation3:navigation3-runtime-tvosarm64
androidx.navigation3:navigation3-runtime-tvossimulatorarm64
androidx.navigation3:navigation3-runtime-tvosx64
androidx.navigation3:navigation3-runtime-wasm-js
androidx.navigation3:navigation3-runtime-watchosarm32
androidx.navigation3:navigation3-runtime-watchosarm64
androidx.navigation3:navigation3-runtime-watchosdevicearm64
androidx.navigation3:navigation3-runtime-watchossimulatorarm64
androidx.navigation3:navigation3-runtime-watchosx64
androidx.paging:paging-common-desktop
androidx.paging:paging-compose-desktop
androidx.paging:paging-compose-iosarm64
androidx.paging:paging-compose-iossimulatorarm64
androidx.paging:paging-compose-iosx64
androidx.paging:paging-compose-js
androidx.paging:paging-compose-linuxarm64
androidx.paging:paging-compose-linuxx64
androidx.paging:paging-compose-macosarm64
androidx.paging:paging-compose-macosx64
androidx.paging:paging-compose-mingwx64
androidx.paging:paging-compose-tvosarm64
androidx.paging:paging-compose-tvossimulatorarm64
androidx.paging:paging-compose-tvosx64
androidx.paging:paging-compose-wasm-js
androidx.paging:paging-compose-watchosarm32
androidx.paging:paging-compose-watchosarm64
androidx.paging:paging-compose-watchosdevicearm64
androidx.paging:paging-compose-watchossimulatorarm64
androidx.paging:paging-compose-watchosx64
androidx.paging:paging-testing-js
androidx.paging:paging-testing-mingwx64
androidx.paging:paging-testing-wasm-js
androidx.text:text-vertical
The full list of over 1000 updated artifacts can be found here.
—Aug 27, 2025
ICEBlock “is an innovative, completely anonymous crowdsourced platform that allows users to report Immigration and Customs Enforcement (ICE) activity with just two taps on their phone.”
The developer of ICEBlock disclosed his identity. In addition to receiving threats of federal prosecution over the app, the developer has faced other backlash, including
his wife being fired from a federal government job.
This is one recent example demonstrating that app developer anonymity has impacts and that the lack of such anonymity can cause harm.
With that example in mind, and in the spirit of a previous issue, I have some questions with regards to their proposed
developer verification program. To Google, these questions might be uncomfortable.
Question 1. What considerations were taken into account with regards to developers with legitimate reasons for anonymity?
For example, suppose that a developer creates an ICEBlock-like app, but one that supports
Android, which ICEBlock does not. Let’s call this workalike app “ICE Scream”. Given the experiences of ICEBlock’s developer, the developer of ICE Scream may have concerns over their identity being disclosed. How would Google like to address such scenarios?
Question 2. Which civil society organizations (e.g., EFF and AccessNow in the US) did Google engage with to review your plans, and what were the results of those engagements?
Organizations such as these have a long track record of dealing with the balance of equities related to privacy and security. A theoretical developer of “ICE Scream” would be well-advised to try reaching out (anonymously) to such organizations for advice. Similarly, their expertise and outside opinions should be of value to Google while drafting programs such as developer verification, and so one hopes that Google availed themselves of such assistance. How did that go?
Question 3. Why does Google’s privacy policy allow Google to share “personal information” with any “businesses or persons”?
Google’s privacy policy states that it provides “personal information to [Google’s] affiliates and other trusted businesses or persons to process it for us”, with no obvious restrictions on who or what constitutes “trusted businesses or persons” and no obvious restrictions on what those parties can do with the personal information. How does Google wish developers, such as the ICE Scream developer, to interpret that policy?
Question 4. How will apps be developed starting in 2027, as app development uses debug keystores, and those keystores do not seem to be part of the Android Developer Verification process? Will it no longer be possible to test apps under development on Google-certified production hardware?
Debug keystores are designed to be transient, as there are few repercussions from replacing those keystores as needed. As such, debug keystores can come and go, especially in environments like classrooms and continuous integration (CI) servers. It seems unrealistic to have these all be registered on a Google-supplied Web site, and it seems hostile to require anyone who wants to learn Android app development to file “papers, please”. How does Google wish for this to work?
Question 5. Similarly, how will apps be developed starting in 2027, as app development often uses duplicate package names (e.g., in educational settings), and duplicate package names are banned? For example, how will developers be able to build and run Google’s own sample projects?
I have a particular interest here, as I am the author of many books on Android app development. I expected readers to be able to download and run the samples, but under this program, it seems like at most one person on the entire planet can do that. Everybody else will get error messages until they go in and change the package name… which will be beyond the skills of many people just learning Android app development. How does Google wish for this to work?
If you have your own questions and concerns, in addition to writing blog posts, you can fill out and submit this form.
If any civil society organizations or others are interested in discussing these and related questions, please reach out!.
And, heck, if Google itself would like to talk about this,
they too can reach out.
—Aug 26, 2025