Cyber Security News

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s recent controversy over photo scanning.

The app, silently installed on Android devices via system updates, enables on-device image analysis to detect sensitive content—a feature marketed as privacy-preserving but criticized for its lack of transparency.

This incident underscores growing user unease about behind-the-scenes AI functionalities on personal devices, even when touted as security measures.

The Emergence of SafetyCore and Its Purpose

SafetyCore, introduced as part of Google’s October 2023 system updates, operates as an on-device framework for classifying content such as spam, scams, or explicit material.

Unlike cloud-based scanning, it processes data locally using machine learning models, avoiding server uploads.

Google positions this as a privacy advancement, allowing apps like Messages to flag inappropriate content without compromising user data.

However, the app’s 2GB storage footprint and background operation remained undisclosed until users detected it under “System Apps.”

GrapheneOS, a privacy-focused Android variant, clarified that SafetyCore itself doesn’t report findings to Google but provides tools for apps to analyze content locally, as per a report by Forbes.

Despite this, the absence of open-source models or upfront disclosure fueled skepticism.

The Backlash: Secrecy Versus Security

The backlash mirrors Apple’s June 2025 outcry over Enhanced Visual Search, which uploaded photo fragments to match landmarks.

While Apple’s system anonymized data, critics like cryptographer Matthew Green rebuked its stealthy enablement. Similarly, SafetyCore’s silent installation on Android 9+ devices—without opt-in consent—drew ire.

ZDNet reported that most users only discovered SafetyCore through Reddit and X posts warning of “spyware” harvesting call logs and location data.

Google maintains that SafetyCore activates only when apps request classification, with users retaining control over enabled features.

A spokesperson emphasized that “binary transparency” logs all system APK updates, aligning with Android’s “least privilege” security model.

Yet, as GrapheneOS noted, closed-source code and proprietary models hinder independent audits, leaving users reliant on Google’s assurances.

Navigating the Privacy Paradox

For privacy advocates, the issue isn’t SafetyCore’s functionality but its covert deployment.

On-device processing theoretically enhances privacy, yet secrecy erodes trust—especially given Google’s history of data practices. Tech forums erupted with guides to uninstall SafetyCore, reflecting widespread mistrust.

While Google allows disabling the app via Settings > Apps > System Apps > SafetyCore, many users remain unaware of this option.

The controversy highlights a critical lesson for tech giants: transparency is non-negotiable. Users demand clarity about AI-driven features, particularly those accessing personal data.

Apple’s and Google’s missteps reveal a gap between technical safeguards and communicative accountability.

As Matthew Green argued, “If you want to turn our phones into AI-fueled machines, tell us first”.

Google’s challenge now lies in balancing innovation with consent. The company plans to expand SafetyCore’s role, including sensitive content warnings for Messages.

Proactive communication—detailing updates in release notes or setup prompts—could mitigate backlash.

Meanwhile, open-sourcing SafetyCore’s framework, as GrapheneOS advocates, might reassure the privacy-conscious.

For users, the dilemma persists: embrace on-device AI for its security benefits or distrust opaque systems.

As ZDNet cautioned, “Just because SafetyCore doesn’t phone home doesn’t mean another Google service can’t”.

In an era of heightened privacy awareness, tech firms must prioritize visibility alongside technical safeguards—or risk alienating users already wary of digital surveillance.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free” and…

9 minutes ago

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity…

12 minutes ago

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging fake…

12 minutes ago

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations…

18 minutes ago

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two malware…

18 minutes ago

Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions

The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with adversaries…

22 minutes ago