Android Protected Confirmation (APC) has established itself for years as one of the most advanced implementations for providing enhanced security for critical transactions carried out on Android devices. This system, based on hardware and software, was intended to protect the most sensitive processes (such as electronic payments, high-value authorizations, and digital signatures) from possible manipulation of the operating system or malicious apps. However, market realities and the evolution of the ecosystem have forced Google to make a strategic decision: remove APC from future versions of Android Due to the very limited adoption by manufacturers and developers, as well as the lack of awareness among end users about the existence and potential advantages of this technology.
Confirmation of the final withdrawal of Android Protected Confirmation It came from renowned Android specialist Mishaal Rahman, who detailed the change on his official channels and social media, supporting the information and generating debate within the community. Although APC was heralded as a landmark innovation for secure person-to-person transactions, its actual impact was very limited. Here you'll find a complete and in-depth guide: It addresses the origins, technical operation, reasons for its removal and, most relevant to today's users and developers, solid alternatives and best security practices currently offered by the Android operating system.
What is Android Protected Confirmation? How it works and how it works

La Android Protected Confirmation It was an API designed so that apps could request a request from the user. explicit and verifiable confirmation of critical operations, using a hardware-protected interface known as Trusted UI. This interface runs in an environment isolated from the rest of the system and applications (Trusted Execution Environment or TEE), ensuring that both the data displayed and the confirmation or denial action are free from manipulation by spyware or malware, even in scenarios where the operating system may be partially compromised.
The implementation and technical flow of Protected Confirmation involved several key steps:
- Generating a secure asymmetric signing key through the Android security APIs, which specified that direct user action would be required for each use.
- Registering the key and its certificate with the trusted backend or server, so that the remote system could verify the integrity and origin of the user's action.
- Sending transaction data (for example, a payment or authorization) to the protected interface, along with a cryptographic nonce to prevent replay attacks and ensure transaction uniqueness.
- Full screen presentation of a confirmation dialog that is impossible to hijack by other applications, which forces the user to accept or reject the operation after reviewing the exact data.
- If the user confirms, a unique digital signature linked to the operation and the registered key is generated, and a verifiable data structure (usually in CBOR format) is sent to the remote server, where all parameters and the authenticity of the process can be verified.
This armored architecture offered ideal guarantees for cases where the immutability of user action essential: banking and fintech, authorizations in medical applications, electronic signature operations, secure online voting, unlocking high-value resources and other scenarios where security must prevail over any potential impersonation attack.
The design of the APC API prohibited any customization of the visual interface by the application, ensuring that no app could simulate or deceive the user about the context of the operation. Furthermore, the key generated under the condition setUserConfirmationRequired() could only sign exactly the data presented to the user, blocking its use for other purposes.

Delving into the technical workings of Protected Confirmation
To understand the relevance and challenges of Protected Confirmation, it is important to analyze the internal steps of the API:
- Use of asymmetric keys and attestation: The developer had to create an asymmetric key using the class
KeyGenParameterSpec.Builderand specifysetUserConfirmationRequired(true). In addition, it was recommended to use the methodsetAttestationChallenge()to prevent keys from being reused in other contexts. For a deeper understanding of how to manage security on Android, you can consult Android security. - Certification and validation of the flow: After the user action, the receiving server was required to verify the certificate chain and confirm that the flag had been set
TRUSTED_CONFIRMATION_REQUIRED. This way, only correctly generated keys on secure devices could validate sensitive operations. - Protection against replay attacks: The nuncio (one-time random number) included in the operation helped disambiguate transactions and prevent a valid response from being maliciously reused.
- Promoting advanced security practices: The design promoted the use of modern protocols, secure storage of credentials, and strong separation between data presented to the user (
promptText) and transaction metadata (extraData). - No customization of the dialogue: Android controlled the entire presentation and location of the dialog, ensuring that no one could deceive the user with similar messages.
The most interesting feature of APC was its use in devices that had dedicated security hardware, such as the module Strong Box, making it easier to build highly reliable apps. However, very few manufacturers supported this component outside of the Google Pixel line.
Reasons behind the removal of Android Protected Confirmation

The decision to retire this feature was driven by a combination of factors related to limited adoption, operational needs, and the industry's current focus on mobile security:
Low adoption among manufacturers and developers
Poor implementation by Android device manufacturers represented the biggest obstacle to APC's expansion. Although Google integrated the API into the Pixel, most brands chose not to include it due to cost, technical complexity, hardware requirements, and a lack of developer pressure to enforce its adoption. Without a critical mass of compatible devices, apps also failed to invest resources into its integration.
Technical complexity, lack of integrated standards and maintenance costs
APC relied on advanced hardware modules (TEE and StrongBox). These components required certification processes, dedicated firmware updates, and sometimes agreements with third-party vendors. Many OEMs felt the potential benefit wasn't worth the added effort and cost. Furthermore, integration required changes to app UX/UI workflows and additional backend protocols, which hampered their widespread adoption.
Focus on global security and prioritization of critical patches
Google has preferred to focus its efforts on the rapid development of general security patches that protect the majority of users from critical vulnerabilities and exploits that affect millions of devices. Maintaining the rarely used APC code structure only added unnecessary risk: it expanded the attack surface and complicated codebase management. Its retirement simplifies the architecture and management of overall Android security.
Marginal demand from users and companies
The average Android user relies heavily on other technologies, such as biometric authentication, strong passwords, and two-step verification. In security-critical sectors (banking, healthcare, technology), companies have opted to implement proprietary solutions using biometric APIs, end-to-end encryption, and more granular business-to-business controls, leaving APC as a residual tool.
Analysis and consensus of the security community
The community of experts and developers has praised the technical robustness of APC but, in practice, has agreed that its real usefulness was limited by the lack of support and the existence of multiple alternatives. Reports and public debates, including those led by figures such as Mishaal Rahman, have supported Google's decision, facilitating the removal of code in the Android Open Source Project and thus reducing vulnerable points.
Robust alternatives and current security methods on Android
The advancement of mobile security continues unabated. Below is a comprehensive set of tools, standards and good practices which means that the disappearance of APC does not represent a significant reduction in the protection of apps and users on Android:
- Enhanced privacy and security policies on the Google Play Store: All apps must pass automatic and manual reviews that look for inappropriate behavior, excessive permission requests, and potential backdoors, reducing the risk of malicious apps.
- Google Play Protect: The system scans installed or newly installed apps for threats. It identifies malware, spyware, or fraud attempts and, if necessary, uninstalls or blocks apps to keep the user safe.
- Two-step verification (2FA) and multi-factor authentication: More and more relevant apps and services require double confirmation from the user via SMS, dedicated authentication apps, physical tokens, or biometrics, making unauthorized access virtually impossible even if a password is compromised.
- Advanced biometric systemsThe latest generations of fingerprint sensors, facial recognition cameras, and iris scanners offer near-instant, robust, and hard-to-fake authentication, fully integrated into the Android ecosystem.
- end-to-end encryptionBanking apps, messaging platforms, and document management platforms all use advanced encryption to protect every byte of information transmitted or stored, preventing malicious actors from accessing sensitive data.
- Automatically reset permissions on inactive apps: Android automatically revokes permissions granted to unused apps, closing potential access to personal information without requiring user interaction.
- Privacy alerts and risk notifications: The system alerts you if an app requests access to particularly sensitive data (location, SMS, contacts, camera, microphone) under suspicious conditions, making it easier to detect spying or fraud attempts.
-
Secure, shared storage managed properly: Through APIs such as
EncryptedSharedPreferencesand internal encrypted storage, apps protect local data and prevent leaks. - Constant updating of dependencies and servicesGoogle encourages developers to keep their libraries, SDKs, and dependencies up-to-date, minimizing zero-day vulnerabilities frequently exploited by cybercriminals.
- Intelligent permission management: Apps are encouraged to request only the strictly necessary permissions and to relinquish them as soon as they are no longer essential, promoting a safe and privacy-respecting experience.
- Secure communication between apps and servicesAndroid promotes the use of intents and signature-based permissions to validate communication between components, preventing third-party apps from intercepting or manipulating data.
- Careful content filtering in WebViews: Loading third-party sites in WebViews is discouraged, and JavaScript functionality is restricted to prevent malicious code from running in untrusted environments.

Best practices recommended for developers and users
Best practices in application development
- Request credentials for sensitive information: Require a PIN, pattern, password, or biometrics to unlock or access private data, especially before displaying valuable information or authorizing transactions.
- Apply network security measuresPrioritize the use of HTTPS traffic and adjust your network settings to block plaintext traffic. Set up a trust manager and follow the recommendations for handling TLS certificates.
- Share data only through secure mechanisms: Use
ContentProvidernot exported, signature-based permissions, and intent mechanisms to prevent leaks. - Avoid storing sensitive data in unsecured locations: Store private data only on internal storage or encrypted APIs, never on external storage unless absolutely necessary.
- Keep dependencies up to date: Regularly review third-party libraries and systems like Google Play Services to avoid vulnerabilities caused by outdated software.
Best practices for home users
- Always download from official stores: Install apps only from Google Play or recognized stores to avoid malware and fraudulent installations.
- Review and manage granted permissions: Frequently check the permissions granted to each app and revoke any unnecessary ones, especially for access to SMS, camera, contacts, or location.
- Enable biometric authentication and two-step verification: Whenever the app or service allows it, enable both mechanisms to add additional layers of security.
- Be alert for system alertsIf Google Play Protect detects threats, follow the uninstall recommendations and do not ignore warnings about unknown or risky apps.
- Keep your system and apps up to date: Perform automatic updates for Android and applications, as many patches correct vulnerabilities that can be exploited by attackers.
- Do not share passwords or access codes: Never provide sensitive information to strangers or on unverified websites.
What happens to apps that relied on Android Protected Confirmation?
Apps that, especially on Pixel devices, leveraged the APC API will need to migrate to other solutions. Google recommends, in these cases, switching to using the Biometric authentication APIs, multi-factor authentication and Trusted Execution Environment if available. Banks, fintech platforms, and technology companies have adapted their authentication flows to these more universal alternatives, which already enjoy widespread support and similar or superior guarantees in terms of security and user experience. For additional information on protection on Android, you can consult How to backup WhatsApp.
For the end user, the transition will not be noticeable in most cases, as apps typically integrate multiple verification methods to ensure service continuity and process security. The migration process is documented in official guides and resources to make the change transparent and secure.
It's common for the retirement of advanced security technology to raise concerns. However, the disappearance of APC does not mean a decrease in the safety standard On Android, on the contrary: the system is making progress in simplifying its architecture, reducing potential vulnerabilities, and strengthening automatic monitoring thanks to mature technologies like Google Play Protect, agile security updates, and the extension of biometric and multi-factor authentication to most critical applications.
Furthermore, the cybersecurity community and experts validate that current protection methodologies, combined with user awareness, offer a level of protection as robust as the one APC could guaranteeThe evolution of the ecosystem toward more universal, easy-to-maintain, and upgradeable systems strengthens collective security and personalizes protection based on each user's context and profile.
The removal of Android Protected Confirmation symbolizes the need to adapt to real trends, needs, and potential threats, ensuring maximum robustness in data protection, transactions, privacy, and device integrity. Android continues to evolve in a direction that combines innovation, convenience, and effective security for all users and developers.