Why Google’s new “Device Recall” API is a step forward — but not the full solution

Image for Google Device Recall API blog post

Google recently introduced a new beta feature within the Play Integrity API: Device Recall, a tool designed to help app developers identify and respond to repeat abuse even after a device is reset. On the surface, this is a major improvement for teams fighting fraud and abuse across Android devices. But while it’s a promising move toward persistent device identification, it comes with key limitations that developers and fraud teams need to understand.

At Fingerprint, we’ve been building persistent device identification solutions for years. Here’s our take on the strengths and tradeoffs of Google’s new approach, and why Fingerprint’s deeper intelligence is still essential for most abuse and fraud use cases.

What is Google’s Device Recall?

Device Recall lets developers assign and retrieve three small custom data bits tied to a specific Android device. These bits persist even if the device is factory reset or the app is reinstalled.

Use cases include:

  • Flagging devices that previously committed abuse
  • Tracking free trial redemptions
  • Preventing promo abuse and mass account creation

The API is privacy-preserving, so developers don’t receive any user identifiers, and data is stored securely on Google’s servers. Device Recall is shared across apps within the same developer account and retained for up to three years.

Strengths of Device Recall

  • Persistence: Survives app reinstall and factory reset. Key for stopping abuse patterns tied to device reuse.
  • Privacy-preserving: No access to hardware IDs, IPs, or user data. Helps comply with privacy regulations.
  • Platform-native: Built directly into the Android and Google Play ecosystem. Easy to integrate for Android-first teams.

Key limitations of Device Recall

While Device Recall is useful for basic abuse prevention, its utility is constrained in several ways:

  • Limited signal capacity: Only 3 custom bits per device — enough for broad flags, but not granular insights.
  • Limited ecosystem and geographic reach: Works only on Android devices with recent Google Play services. No support for web, iOS, or unlicensed Android forks. Apps distributed via alternative app stores (like Samsung Galaxy Store or Huawei AppGallery) can’t use it, nor can devices in regions where Google services are restricted or absent (e.g., China, Russia). In practice, this limits coverage on up to 1 billion of the 3.5 billion Android devices worldwide
  • No behavioral context: Doesn’t capture the why behind abuse — just that a flag was previously set. 
  • 14-day write window: You can only set recall bits within 14 days of receiving the integrity verdict, limited flexibility for delayed fraud detection. This is particularly inconvenient for use cases involving chargebacks or payment disputes, where fraud often surfaces weeks or months later. 
  • Requires warmup: Updated recall values aren’t instantly reflected — requires another warmup call to read changes. 

The advantages of Fingerprint over Google’s Device Recall

While Device Recall offers a lightweight, privacy-friendly way to flag abusive devices, Fingerprint provides a far more comprehensive approach to device intelligence. Here’s how.

Cross-platform device identification

Fingerprint identifies users across web, mobile web, iOS, and Android, enabling consistent detection of device-based abuse across environments, and not just within Play Store apps.

Deeper insights with Smart Signals

Fingerprint’s Smart Signals go far beyond “yes/no” flags. They include:

  • High-Activity Device Detection: Spot patterns like mass account creation or credential stuffing.
  • VPN/Proxy Detection: Identify traffic obfuscation attempts.
  • Browser/Device Tampering Detection: Surface spoofed or modified environments.

These signals work together to build a risk profile in real time, allowing you to tailor enforcement dynamically, and introducing friction only when necessary.

Custom labeling without constraints

Unlike Device Recall’s three bits, Fingerprint lets you log, tag, and analyze devices with as many custom labels or tags as your use case demands, giving you the flexibility to label devices based on any risk signals that matter to your business.

Final thoughts: Device Recall is complementary, not comprehensive

Google’s Device Recall is a welcome addition to the fraud prevention toolkit, especially for Android-first teams operating inside the Play Store ecosystem. It can help flag repeat abusers at a very basic level, and it’s built with privacy in mind.

But for teams that need a more holistic and cross-platform view of user identity, intent, and risk,  Fingerprint provides the depth, accuracy, and flexibility that Device Recall lacks.

Want to see how Fingerprint helps you detect more fraud, reduce friction for good users, and go beyond surface-level flags? Request a demo to see our Smart Signals in action.

Share this post