After updating to Android 14, some users with a Pixel 6 and later who have multiple users or profiles set up have been unable to access any of their media storage on the primary user.
Google now says they "have already pushed out a Google Play system update" that will "help prevent this issue from being triggered on additional devices." Google anticipates that "a system update will repair the issue and restore access to media files without requiring a factory reset."
Unfortunately, if your device is "stuck in a 'Pixel is starting' boot loop", which happens when the device repeatedly reboots and the user declines factory resetting their device when prompted on the Android recovery screen, then there currently isn't a fix. However, Google says they are "investigating methods that may be able to recover some data" and that they'll "provide more information as soon as it is available."
If you have a Pixel phone on Android 14 and are not currently having this issue, or you already factory reset your phone after encountering this issue, then it's recommended that you don't create or log into a secondary user on the device until Google pushes the OTA update fixing the issue.
Google now says they "have already pushed out a Google Play system update" that will "help prevent this issue from being triggered on additional devices." Google anticipates that "a system update will repair the issue and restore access to media files without requiring a factory reset."
Unfortunately, if your device is "stuck in a 'Pixel is starting' boot loop", which happens when the device repeatedly reboots and the user declines factory resetting their device when prompted on the Android recovery screen, then there currently isn't a fix. However, Google says they are "investigating methods that may be able to recover some data" and that they'll "provide more information as soon as it is available."
If you have a Pixel phone on Android 14 and are not currently having this issue, or you already factory reset your phone after encountering this issue, then it's recommended that you don't create or log into a secondary user on the device until Google pushes the OTA update fixing the issue.
π63π€‘13π€6π5
Samsung is starting to roll out the stable release of One UI 6.0 (based on Android 14) to the Galaxy S23 series, as reported by Sam Mobile.
With Android 14 now reaching Samsung's flagships, we should start seeing a noticeable uptick in the number of users on the latest Android OS release.
With Android 14 now reaching Samsung's flagships, we should start seeing a noticeable uptick in the number of users on the latest Android OS release.
SamMobile
BREAKING: Stable Galaxy S23 Android 14 (One UI 6.0) update is here!
Samsung is rolling out the stable Android 14-based One UI 6.0 update for the Galaxy S23, Galaxy S23+, and Galaxy S23 Ultra for beta testers.
π₯55π₯±13β€6π±6π3π₯°1
Porsche has announced that it's integrating Android Automotive with Google Automotive Services into its future infotainment systems. Production of this updated infotainment system will start "in the middle of the decade".
"This integration of the Google ecosystem will include Google Maps, Google Assistant, and a wide variety of apps available through the Google Play Store."
Porsche says that the UI of its Porsche Communication Management (PCM) system will remain familiar to existing customers, and that in the future, "ecosystems from different providers that are relevant for customers will be integrated directly into the vehicle via standardized interfaces and platforms."
"This integration of the Google ecosystem will include Google Maps, Google Assistant, and a wide variety of apps available through the Google Play Store."
Porsche says that the UI of its Porsche Communication Management (PCM) system will remain familiar to existing customers, and that in the future, "ecosystems from different providers that are relevant for customers will be integrated directly into the vehicle via standardized interfaces and platforms."
π60β€9π€‘4π1
This media is not supported in your browser
VIEW IN TELEGRAM
Google has provided an update on the status of RISC-V support in Android.
- Work on a fully optimized backend for the Android Runtime (ART) is still a work in progress
- AOSP, external projects, and compilers haven't generated fully optimized, reduced code that also takes advantage of the latest ratified extensions, such as the one for vectors.
- Later this year, Google expects to have the NDK ABI finalized and canary builds made available on Android's public CI soon, as well as RISC-V on x86-64 & ARM64 available for easier testing of riscv64 Android apps on a host machine.
- By 2024, the plan is to have emulators available publicly with a full feature set to test apps for various device form factors. Wearables are expected to be the first form factor available (see: Google and Qualcomm's recent announcement).
- Google is working with the community and the RISC-V Software Ecosystem (RISE) Project to provide a way to accelerate the availability of software for high-performance and power-efficient RISC-V processor cores running high-level operating systems. Google is also continuing to invest in RISC-V International.
If you're interested in contributing, you can go to the android-riscv64 GitHub project to discuss, submit issues, and stay up-to-date on the current progress. You can also subscribe to the RISC-V Android SIG mailing list. Finally, you can also build, test, and run an Android RISC-V image as a CVD. Just select the
- Work on a fully optimized backend for the Android Runtime (ART) is still a work in progress
- AOSP, external projects, and compilers haven't generated fully optimized, reduced code that also takes advantage of the latest ratified extensions, such as the one for vectors.
- Later this year, Google expects to have the NDK ABI finalized and canary builds made available on Android's public CI soon, as well as RISC-V on x86-64 & ARM64 available for easier testing of riscv64 Android apps on a host machine.
- By 2024, the plan is to have emulators available publicly with a full feature set to test apps for various device form factors. Wearables are expected to be the first form factor available (see: Google and Qualcomm's recent announcement).
- Google is working with the community and the RISC-V Software Ecosystem (RISE) Project to provide a way to accelerate the availability of software for high-performance and power-efficient RISC-V processor cores running high-level operating systems. Google is also continuing to invest in RISC-V International.
If you're interested in contributing, you can go to the android-riscv64 GitHub project to discuss, submit issues, and stay up-to-date on the current progress. You can also subscribe to the RISC-V Android SIG mailing list. Finally, you can also build, test, and run an Android RISC-V image as a CVD. Just select the
aosp_cf_riscv64_phone-userdebug target in the lunch menu.π45π€9β€4π₯3
Google has once again updated the Android version distribution statistics shown to developers in Android Studio to reflect data up to October 1, 2023.
Here's how the % of (GMS Android) devices has changed since May 30, 2023 when the stats were last publicly updated.
- Android 13: 15% -> 22.4%
- Android 12: 16.3% -> 15.8%
- Android 11: 23.1% -> 21.6%
- Android 10: 17.8% -> 16.1%
- Android 9: 11.9% -> 10.5%
- Android 8.1: 6.1% -> 5.4%
- Android 8: 2.2% -> 1.9%
- Android 7.1: 1.5% -> 1.3%
- Android 7: 1.5% -> 1.3%
- Android 6: 2.3% -> 1.9%
- Android 5.1: 1.5% -> 1.2%
- Android 5: 0.3% -> 0.2%
- Android 4.4: 0.5% -> 0.4%
Android 13 leaps from 15% to 22.4% of all devices. The Android OS version with the second highest install base is now Android 11 at 21.6% followed by Android 10 at 16.1%. Android 12 is installed on 15.8% of all devices.
The % of devices running an Android OS version that Google actively supports through security patch backports (ie. Android 11+) is 59.8%, up from 54.4%.
H/T GizChina
Here's how the % of (GMS Android) devices has changed since May 30, 2023 when the stats were last publicly updated.
- Android 13: 15% -> 22.4%
- Android 12: 16.3% -> 15.8%
- Android 11: 23.1% -> 21.6%
- Android 10: 17.8% -> 16.1%
- Android 9: 11.9% -> 10.5%
- Android 8.1: 6.1% -> 5.4%
- Android 8: 2.2% -> 1.9%
- Android 7.1: 1.5% -> 1.3%
- Android 7: 1.5% -> 1.3%
- Android 6: 2.3% -> 1.9%
- Android 5.1: 1.5% -> 1.2%
- Android 5: 0.3% -> 0.2%
- Android 4.4: 0.5% -> 0.4%
Android 13 leaps from 15% to 22.4% of all devices. The Android OS version with the second highest install base is now Android 11 at 21.6% followed by Android 10 at 16.1%. Android 12 is installed on 15.8% of all devices.
The % of devices running an Android OS version that Google actively supports through security patch backports (ie. Android 11+) is 59.8%, up from 54.4%.
H/T GizChina
π89β€14π3
The Pixel's car crash detection feature is now available in 5 new countries, including Austria, Belgium, India, Portugal, and Switzerland.
Google updated its support page to include these countries sometime this month, and several users from India told me they're now able to turn this feature on.
Thanks to Yuval for the tip!
Google updated its support page to include these countries sometime this month, and several users from India told me they're now able to turn this feature on.
Thanks to Yuval for the tip!
π79β€15π5π₯4π€2
Android is preparing to add better support for Apple pkpass files. PKPass is a file type that holds pass data that can be imported into Apple Wallet.
Android currently maps the .pkpass and .pkpasses file extensions to the
Soon, though, Android may map these file extensions to
What does this actually mean for Android, though? Well, it doesn't mean that apps like Google Wallet will all of a sudden be able to import .pkpass files, nor does it mean that apps couldn't already recognize or parse .pkpass files already. For example, the Pass2Pay app already lets you import .pkpass files.
What this does mean is that it'll be easier for apps to set up a handler for .pkpass files. Pass2Pay, for example, uses some messy regex in its Manifest to handle .pkpass files. Hopefully Google Wallet adds .pkpass import support soon, especially now that it just added generic pass photo import.
Android currently maps the .pkpass and .pkpasses file extensions to the
application/octet-stream MIME type. A MIME type is a string that consists of a "type/subtype" representing the kind of data contained within the file. Mapping .pkpass and .pkpasses to application/octet-stream means they're treated as generic binary data.Soon, though, Android may map these file extensions to
application/vnd.apple.pkpass and application/vnd.apple.pkpasses respectively, which would allow Apple Wallet PKPass files to be resolved correctly.What does this actually mean for Android, though? Well, it doesn't mean that apps like Google Wallet will all of a sudden be able to import .pkpass files, nor does it mean that apps couldn't already recognize or parse .pkpass files already. For example, the Pass2Pay app already lets you import .pkpass files.
What this does mean is that it'll be easier for apps to set up a handler for .pkpass files. Pass2Pay, for example, uses some messy regex in its Manifest to handle .pkpass files. Hopefully Google Wallet adds .pkpass import support soon, especially now that it just added generic pass photo import.
π62πΏ4
Mishaal's Android News Feed
Android is preparing to add better support for Apple pkpass files. PKPass is a file type that holds pass data that can be imported into Apple Wallet. Android currently maps the .pkpass and .pkpasses file extensions to the application/octet-stream MIME type.β¦
Last year, a Googler said that "we are actively working on this feature." The feature being support for importing .pkpass files into Google Wallet.
(Thanks to Xander for the heads up!)
(Thanks to Xander for the heads up!)
π41π₯4
This media is not supported in your browser
VIEW IN TELEGRAM
The latest loophole that third-party file manager apps were using to get access to files and folders under /Android/data and /Android/obb has been patched.
As part of Android 11's Scoped Storage restrictions, apps that use the Storage Access Framework (SAF) to launch the documents picker are not supposed to be able to get access to files and folders under the /Android/data or /Android/obb directories.
However, third-party file managers figured out that if they set the initial directory when launching the documents picker to either /Android/data or /Android/obb, the documents picker lets the user grant the app full access to directories. This loophole was patched in Android 13, but then another loophole was discovered that got around this.
Since Android 13 only blocked apps from setting /Android/data or /Android/obb as the initial directory when launching the documents picker, it was quickly discovered that you could set the initial directory to one of the subdirectories under /Android/data or /Android/obb, thus the user could grant access to individual subdirectories one-by-one.
However, this latest loophole was patched with a recent Google Play System Update. The latest version of the DocumentsUI app, the Project Mainline module that comprises the documents picker, now restricts the initial location for the ACTION_OPEN_DOCUMENT/_TREE intent so that apps cannot request the initial location to be one of /Android/data, /Android/sandbox, /Android/obb, or one of their subdirectories.
If the DocumentsUI app (AKA 'Files' app) on your device is on version 14-10492947 (version code 340916000), then this loophole is patched.
β-
If you still want to read/write files under /Android/data or /Android/obb, there are no restrictions if you connect your phone to a PC or use ADB shell commands.
The AOSP Files app also lets you browse files in those directories, though you're limited in how much you can modify.
As part of Android 11's Scoped Storage restrictions, apps that use the Storage Access Framework (SAF) to launch the documents picker are not supposed to be able to get access to files and folders under the /Android/data or /Android/obb directories.
However, third-party file managers figured out that if they set the initial directory when launching the documents picker to either /Android/data or /Android/obb, the documents picker lets the user grant the app full access to directories. This loophole was patched in Android 13, but then another loophole was discovered that got around this.
Since Android 13 only blocked apps from setting /Android/data or /Android/obb as the initial directory when launching the documents picker, it was quickly discovered that you could set the initial directory to one of the subdirectories under /Android/data or /Android/obb, thus the user could grant access to individual subdirectories one-by-one.
However, this latest loophole was patched with a recent Google Play System Update. The latest version of the DocumentsUI app, the Project Mainline module that comprises the documents picker, now restricts the initial location for the ACTION_OPEN_DOCUMENT/_TREE intent so that apps cannot request the initial location to be one of /Android/data, /Android/sandbox, /Android/obb, or one of their subdirectories.
If the DocumentsUI app (AKA 'Files' app) on your device is on version 14-10492947 (version code 340916000), then this loophole is patched.
β-
If you still want to read/write files under /Android/data or /Android/obb, there are no restrictions if you connect your phone to a PC or use ADB shell commands.
The AOSP Files app also lets you browse files in those directories, though you're limited in how much you can modify.
π97π38π8π2π€‘2
scrcpy just keeps getting better and better. Version 2.2 was just released with support for camera mirroring. This lets you mirror the device camera instead of the device screen.
I tried it out, and it worked pretty well at 1080p even when connected wirelessly.
I tried it out, and it worked pretty well at 1080p even when connected wirelessly.
β€92π14π7β€βπ₯6π₯6
Google has announced that the new Telecom Jetpack library is now in alpha. This library is aimed at voice and/or video calling apps and provides a variety of features, including:
* Platform synchronization: Makes the platform "aware" of your VoIP call so that other surfaces (like watches) can show information like who the caller is as well as actions to answer, decline, hang up, or mute your call. Also, if other calls such as a PTSN/SIM-based call comes through, you can give the user a chance to hold the call they're currently on.
* Dedicated foreground support. Android 14 requires apps to specify foreground service types. The Jetpack Telecom library takes care of that requirement for you.
* Audio routing: The Telecom library can list all available endpoints to your app for streaming audio to/from, so you don't have to use the audio manager API to track state, focus, and obtain a list of audio devices yourself.
* Backwards compatibility: This library works on devices that support Android's Telecom stack (PackageManager.FEATURE_TELECOM) running Android 8.0 Oreo or later.
Coming soon:
* Expanded support for VoIP Call actions: Being able to locally mute the VoIP app for the specific call and display the name of the speaker on another surface like Android Auto.
* Transfer VoIP calls: Users will be able to transfer ongoing VoIP calls between their phones and tablets.
Version 1.0.0-alpha01 was released on May 10 at Google I/O 2023, but alpha02 was released on October 4.
* Platform synchronization: Makes the platform "aware" of your VoIP call so that other surfaces (like watches) can show information like who the caller is as well as actions to answer, decline, hang up, or mute your call. Also, if other calls such as a PTSN/SIM-based call comes through, you can give the user a chance to hold the call they're currently on.
* Dedicated foreground support. Android 14 requires apps to specify foreground service types. The Jetpack Telecom library takes care of that requirement for you.
* Audio routing: The Telecom library can list all available endpoints to your app for streaming audio to/from, so you don't have to use the audio manager API to track state, focus, and obtain a list of audio devices yourself.
* Backwards compatibility: This library works on devices that support Android's Telecom stack (PackageManager.FEATURE_TELECOM) running Android 8.0 Oreo or later.
Coming soon:
* Expanded support for VoIP Call actions: Being able to locally mute the VoIP app for the specific call and display the name of the speaker on another surface like Android Auto.
* Transfer VoIP calls: Users will be able to transfer ongoing VoIP calls between their phones and tablets.
Version 1.0.0-alpha01 was released on May 10 at Google I/O 2023, but alpha02 was released on October 4.
π58β€11π2π€1π1
Here are the most important Google System updates that rolled out in October 2023.
* "[Phone] Support to connect your watch to multiple phones seamlessly" (available with Google Play Services v23.39+). It's not exactly clear what this means.
* "[Phone] Content received over Nearby Share is stored in a new location" (available with Google Play Services v23.40+). Files you receive via Nearby Share are now saved in the "Nearby Share" folder under "Download" rather than the "Download" folder itself.
* "[Phone] Nearby Share is disabled in work profiles" (available with Google Play Services 23.41+). Some have speculated that this was done to mitigate theft (intentional or not) of corporate data, but I heard this was disabled simply because it just didn't work properly and there isn't enough bandwidth to fix the issues.
* "[Phone] You can now decide if Google Play can update an app that was installed by a different app store" (available with Google Play Store v38.2+). This may be Google Play implementing support for Android 14's update ownership API, or it might not be. Either way, this is a welcome change for users who sideload and/or install apps from alternative sources.
* "[Wear] Users can now install and set watch faces directly from the Play store listing and opt in to always automatically set watchfaces upon install" (available with Google Play Store v38.2+). This hasn't rolled out on my Pixel Watch 2 yet, so I don't have a screenshot to share.
* "[Phone] Support adding Wallet passes from images containing barcodes or QR codes" (available with Google Play Services v23.42+). Google Wallet now lets you create a pass using a photo or screenshot of a barcode or QR code. This was announced as part of the September 2023 Android Feature Drop.
(1/2)
* "[Phone] Support to connect your watch to multiple phones seamlessly" (available with Google Play Services v23.39+). It's not exactly clear what this means.
* "[Phone] Content received over Nearby Share is stored in a new location" (available with Google Play Services v23.40+). Files you receive via Nearby Share are now saved in the "Nearby Share" folder under "Download" rather than the "Download" folder itself.
* "[Phone] Nearby Share is disabled in work profiles" (available with Google Play Services 23.41+). Some have speculated that this was done to mitigate theft (intentional or not) of corporate data, but I heard this was disabled simply because it just didn't work properly and there isn't enough bandwidth to fix the issues.
* "[Phone] You can now decide if Google Play can update an app that was installed by a different app store" (available with Google Play Store v38.2+). This may be Google Play implementing support for Android 14's update ownership API, or it might not be. Either way, this is a welcome change for users who sideload and/or install apps from alternative sources.
* "[Wear] Users can now install and set watch faces directly from the Play store listing and opt in to always automatically set watchfaces upon install" (available with Google Play Store v38.2+). This hasn't rolled out on my Pixel Watch 2 yet, so I don't have a screenshot to share.
* "[Phone] Support adding Wallet passes from images containing barcodes or QR codes" (available with Google Play Services v23.42+). Google Wallet now lets you create a pass using a photo or screenshot of a barcode or QR code. This was announced as part of the September 2023 Android Feature Drop.
(1/2)
β€31π17
Mishaal's Android News Feed
Here are the most important Google System updates that rolled out in October 2023. * "[Phone] Support to connect your watch to multiple phones seamlessly" (available with Google Play Services v23.39+). It's not exactly clear what this means. * "[Phone] Contentβ¦
There are a couple of other minor changes, such as:
* "[Phone] New design on the app details page to help you discover and learn about apps for your non-phone devices" (available with Google Play Store v37.8+). On the Play Store listing for apps that are available on multiple form factors, you might see a chip beneath the "install" button that lets you change which form factor's screenshots are shown.
* "[Wear] Warning messages are now visible on detail pages for apps that are prone to crashes" (available with Google Play Store v38.2+). This brings a feature that is already available in the Play Store for phones over to watches.
As a reminder, the Google System Updates changelog is comprised of Google Play System Updates (ie. Project Mainline updates) plus updates to a variety of Google system apps like the Google Play Store, Google Play Services, and more recently Android WebView and Android System Intelligence.
(2/2)
* "[Phone] New design on the app details page to help you discover and learn about apps for your non-phone devices" (available with Google Play Store v37.8+). On the Play Store listing for apps that are available on multiple form factors, you might see a chip beneath the "install" button that lets you change which form factor's screenshots are shown.
* "[Wear] Warning messages are now visible on detail pages for apps that are prone to crashes" (available with Google Play Store v38.2+). This brings a feature that is already available in the Play Store for phones over to watches.
As a reminder, the Google System Updates changelog is comprised of Google Play System Updates (ie. Project Mainline updates) plus updates to a variety of Google system apps like the Google Play Store, Google Play Services, and more recently Android WebView and Android System Intelligence.
(2/2)
π32β€12
Mishaal's Android News Feed
After updating to Android 14, some users with a Pixel 6 and later who have multiple users or profiles set up have been unable to access any of their media storage on the primary user. Google now says they "have already pushed out a Google Play system update"β¦
Important: Google has followed up on this issue!
Google says that, starting in the next two weeks, they'll roll out an OTA update for impacted users that will return their devices to a working state. However, this update may not enable data to be recovered for devices that are repeatedly rebooting.
If you'd rather not wait for this update to roll out, you can sign up to test the update ahead of its release. This update may help remedy the issue without clearing your device's data. All you have to do is fill out this Google Form to receive the test update.
Several users who received the OTA update already commented on the Issue Tracker that full functionality (including secondary users) was restored after updating.
For those devices that are repeatedly rebooting, the only workaround that is currently known to recover them is to do a Factory Data Reset (FDR). This will obviously clear all your phone's data, so only do this if you've backed your data up. You can perform a FDR using your phone's buttons by following these steps.
Google says that, starting in the next two weeks, they'll roll out an OTA update for impacted users that will return their devices to a working state. However, this update may not enable data to be recovered for devices that are repeatedly rebooting.
If you'd rather not wait for this update to roll out, you can sign up to test the update ahead of its release. This update may help remedy the issue without clearing your device's data. All you have to do is fill out this Google Form to receive the test update.
Several users who received the OTA update already commented on the Issue Tracker that full functionality (including secondary users) was restored after updating.
For those devices that are repeatedly rebooting, the only workaround that is currently known to recover them is to do a Factory Data Reset (FDR). This will obviously clear all your phone's data, so only do this if you've backed your data up. You can perform a FDR using your phone's buttons by following these steps.
π52π€‘7