Judge orders Google to distribute third-party app stores on Google Play



google play

Google plans appeal

Epic Games CEO Tim Sweeney wrote that the injunction “means all app developers, store makers, carriers, and manufacturers have 3 years to build a vibrant and competitive Android ecosystem with such critical mass that Google can’t stop it.”

Google issued a response saying it will appeal the underlying verdict and “will ask the courts to pause Epic’s requested changes, pending that appeal.”

The court-ordered “changes would put consumers’ privacy and security at risk, make it harder for developers to promote their apps, and reduce competition on devices,” Google VP of Regulatory Affairs Lee-Anne Mulholland wrote. “Ultimately, while these changes presumably satisfy Epic, they will cause a range of unintended consequences that will harm American consumers, developers and device makers.”

Mulholland also said the injunction will “undercut Android’s ability to compete with Apple’s iOS.”

“These Epic-requested changes stem from a decision that is completely contrary to another court’s rejection of similar claims Epic made against Apple—even though, unlike iOS, Android is an open platform that has always allowed for choice and flexibility like multiple app stores and sideloading,” she wrote.

Judge dismisses Google arguments

Donato’s order allows Google to impose security restrictions on third-party apps, but he said that Google must show that any restrictions are necessary.

“As Google has suggested, there are potential security and technical risks involved in making third-party apps available, including rival app stores,” Donato wrote. “The Court is in no position to anticipate what those might be, or how to solve them. Consequently, Google will have room to engage in its normal security and safety processes. To the extent Google imposes requirements along these lines on rival app stores, it will… bear the burden when challenged of establishing that the requirements were strictly necessary to achieve safety and security for users and developers.”



Source link

About The Author

Scroll to Top