Menu
developer-tech

ARTICLE

LOG IN

  • News
  • Categories
    • Approaches
      • Continuous Delivery
      • DevOps
      • Microservices
    • Artificial Intelligence
    • Databases
    • Development Tools
      • Analytics
      • API
      • Frameworks
      • Git
      • IDE
      • SDK
    • Gaming
    • Hacking & Security
    • Languages
      • Go
      • HTML
      • Java
      • JavaScript
      • Kotlin
      • Python
      • Rust
      • Swift
    • Open Source
    • Platforms
      • Android
      • App Stores
      • Blockchain
      • Cloud
      • iOS
      • Linux
      • Metaverse
      • Wearables
      • Windows
    • Research
    • UX/Design
    • Virtual Reality
  • Events
  • Webinars & Resources
  • Work With Us
    • Publish an article or press release
    • Advertise On Developer News
    • Contact Us
  • Subscribe / Login
  • More TechForge News
    • AI News
    • The Block
    • Cloud Tech News
    • Edge Computing News
    • IoT News
    • Marketing Tech News
    • Tech HQ
    • Tech Wire Asia
    • Telecoms Tech News
  • Upcoming Events
  • News
  • Categories
    • Approaches
      • Continuous Delivery
      • DevOps
      • Microservices
    • Artificial Intelligence
    • Databases
    • Development Tools
      • Analytics
      • API
      • Frameworks
      • Git
      • IDE
      • SDK
    • Gaming
    • Hacking & Security
    • Languages
      • Go
      • HTML
      • Java
      • JavaScript
      • Kotlin
      • Python
      • Rust
      • Swift
    • Open Source
    • Platforms
      • Android
      • App Stores
      • Blockchain
      • Cloud
      • iOS
      • Linux
      • Metaverse
      • Wearables
      • Windows
    • Research
    • UX/Design
    • Virtual Reality
  • Events
  • Webinars & Resources
  • Work With Us
    • Publish an article or press release
    • Advertise On Developer News
    • Contact Us
  • Subscribe / Login
  • More TechForge News
    • AI News
    • The Block
    • Cloud Tech News
    • Edge Computing News
    • IoT News
    • Marketing Tech News
    • Tech HQ
    • Tech Wire Asia
    • Telecoms Tech News
  • Upcoming Events
developer-tech

Google increases developer verification requirements to combat fakes

About the Author

By Ryan Daws | 30th June 2021 https://twitter.com/gadget_ry
Categories: Android, App Stores, Platforms,

Ryan Daws is a senior editor at TechForge Media with over a decade of experience in crafting compelling narratives and making complex topics accessible. His articles and interviews with industry leaders have earned him recognition as a key influencer by organisations like Onalytica. Under his leadership, publications have been praised by analyst firms such as Forrester for their excellence and performance. Connect with him on X (@gadget_ry) or Mastodon (@gadgetry@techhub.social)


Google is tightening up its verification requirements for developers in a bid to combat a growing number of fake accounts.

For those inclined, it’s currently not difficult to purchase fake accounts such as the ones being offered in this forum:

Play Store developers will soon have to verify their email address and phone number and provide extra details like a physical address to help ensure the account is being created legitimately.

Google will also mandate the use of two-factor authentication to help prevent legitimate accounts from being compromised.

In its announcement, the company suggests the following best practices to ensure your account remains “in good health” and doesn’t end up being suspended:

  • Keep your contact information active and up to date. We may occasionally check if your account is active by emailing or calling the account owner using the details provided, so it is important that they are accurate.
  • Consider using a contact email address different to the one that you use to create your Google account, especially if your developer account will have multiple users or is for an organization or business. You might want to consider setting up a dedicated shared inbox for this purpose, so that the right set of people within your team or organization can access these important messages. We encourage you to use an email address from your own domain if you have one. 
  • The contact email address for an organization or business account should not be a generic or personal email address. Make sure to use an email address associated with your organization.

Developers can declare their account type and verify their contact details from today, but this is currently optional.

Starting in August, all new accounts will need to comply with the new requirements. Later this year, all new and existing accounts will be required to declare their account type, provide the necessary details, verify their contact information, and enable two-factor authentication.

(Photo by Sammy Williams on Unsplash)

Want to learn about DevOps from leaders in the space? Check out the DevOps-as-a-Service Summit, taking place on October 7 2021, where attendees will learn about the benefits of building collaboration and partnerships in delivery.

Tags: android, fake account, featured, google, mobile, platforms, play store, verification

View Comments
Leave a comment

One comment on “Google increases developer verification requirements to combat fakes”

  1. Lia Carter on December 21st, 2021 - 6:15am

    Useful article. Thanks for sharing

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

Red fabric illustrating the typosquatting of a popular Python package that steals AWS credentials from unsuspecting software developers on Linux and Windows.

Python package ‘fabrice’ steals AWS credentials

Hacking & Security
CSS trends 2024: Insights into developer experience, tools, and more

CSS trends 2024: Developer experience, tools, and more

Developer
Photo of a chain illustrating the discovery of a malware campaign that takes advantage of the npm packages ecosystem for a software supply chain attack and uses the Ethereum blockchain for resilience against cyber security detection and mitigation strategies.

NPM supply chain attack uses Ethereum blockchain

Hacking & Security
A whale made of emerald illustrating the discovery of the EMERALDWHALE campaign by cyber security researchers that exploits Git configuration files and has leaked over 15,000 credentials.

EMERALDWHALE exploits vulnerable Git configuration files

Developer

Other News

  • Artificial Intelligence News
  • Blockchain News
  • Cloud Computing News
  • Developer News
  • Edge Computing News
  • IoT News
  • MarketingTech News
  • Tech HQ
  • Tech Wire Asia
  • Telecoms News
  • View all TechForge Publications
  • Cookie Policy (UK)

Events

  • Developer Events
  • Data Centre Congress
  • Digital Transformation Week
  • IoT Events
  • Marketing Events
  • Telecoms Events
  • Upcoming Tech Events & Webinars

Categories

  • API
  • Artificial Intelligence
  • Cloud
  • UX/Design

Developer Tech offers the latest app developer news and strategy. We cover topics, including coding, monetisation, billing, marketing and design, within the app development industry. We aim to help developers by providing top-class practical content across many issues.

Founded in 2011, we provide a channel for expert, brands and thought leaders to share content and engage with other industry professionals around the world.

Please follow this link for our privacy policy.

Copyright © 2024 Developer Tech News. All Rights Reserved.

Login

Forgot Password?

Not subscribed / a member yet?

Register

"*" indicates required fields

Personal Details

Company Details

Account Details

This must be a combination of letters and numbers
Password*
Consent*
By submitting this form, I acknowledge that I have read and understood the Privacy Policy and subscribe to receive communications from TechForge Media Ltd.
View privacy policy

Step 1 of 3

This field is for validation purposes and should be left unchanged.

Already a member / subscriber?

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}