Tending the Garden: How to Ensure That App Stores Put Users First
Total Page:16
File Type:pdf, Size:1020Kb
Tending the Garden: How to Ensure That App Stores Put Users First June 2020 John Bergmayer Acknowledgements The author would like to thank those that provided feedback during the drafting of this paper, including Blake Reid at the University of Colorado Law School, Hal Singer, managing director at Econ One and an adjunct professor at Georgetown’s McDonough School of Business, and Will Jennings, student at the Indiana University McKinney School of Law and intern at Public Knowledge, for editing assistance. This paper, along with other work from Public Knowledge on platform competition, was made possible by the support of the Omidyar Network. The cover image is The Artist’s Garden at Eragny, by Camille Pissarro, oil on canvas, 1898. This public domain image was sourced via the National Gallery of Art. The remainder of the paper is licensed under the Creative Commons Attribution- ShareAlike 4.0 International (CC BY-SA 4.0) license, the terms of which may be found here: https://creativecommons.org/licenses/by-sa/4.0. Table of Contents EXECUTIVE SUMMARY ................................................................................................................................. 1 INTRODUCTION ........................................................................................................................................... 2 EXAMPLES OF APP STORES ......................................................................................................................... 8 APP STORES VS SECURITY ARCHITECTURES ............................................................................................. 11 EXCLUSIVE SOURCE OF SOFTWARE ................................................................................................................ 12 CODE-SIGNING ......................................................................................................................................... 13 SANDBOXING AND PERMISSIONS .................................................................................................................. 14 API RESTRICTIONS ....................................................................................................................................... 15 DRM ....................................................................................................................................................... 16 BENEFITS OF APP STORES .......................................................................................................................... 16 DRAWBACKS OF APP STORES .................................................................................................................. 19 IT IS HARD TO COMPETE WITH A PLATFORM ..................................................................................................... 19 APP STORES PLACE BUSINESS MODEL CONSTRAINTS ON DEVELOPERS ................................................................. 24 CENSORSHIP AND CURATION ....................................................................................................................... 34 CUSTOMER OWNERSHIP, RESALE, AND PRESERVATION ..................................................................................... 36 SINGLE TARGET FOR SCAMS ......................................................................................................................... 38 EXCLUSION OF CERTAIN MARKETS ................................................................................................................. 39 APP STORE TRADEOFFS MAY NOT BE THE BEST FOR ALL USERS ............................................................................. 39 CASE STUDIES ............................................................................................................................................. 40 DUPLICATING BUILT-IN FUNCTIONALITY AND DEFAULTS ..................................................................................... 40 SPOTIFY, AND THE REQUIRED USE OF IN-APP PURCHASE SYSTEM FOR NON-APP CONTENT ...................................... 42 FORTNITE AND THE GOOGLE PLAY STORE ...................................................................................................... 44 EXCLUSIVE ACCESS TO HARDWARE FEATURES ................................................................................................. 44 PREFERENTIAL TREATMENT OF IMPORTANT APPS ............................................................................................... 45 HKMAP.LIVE, AND GOVERNMENT PRESSURE TO CENSOR .................................................................................. 46 APPLE, AT&T, AND THE FCC ...................................................................................................................... 47 MORAL CENSORSHIP .................................................................................................................................. 48 LOCATION DATA IN IOS 13 ......................................................................................................................... 49 PARENTAL CONTROL APPS ........................................................................................................................... 50 SOLUTIONS ................................................................................................................................................. 52 SIDELOADING ............................................................................................................................................ 52 IN-APP PURCHASE REQUIREMENTS SHOULD BE LIMITED TO APP FUNCTIONALITY ..................................................... 56 DEVELOPERS SHOULD BE ABLE TO TRUTHFULLY COMMUNICATE WITH THEIR CUSTOMERS ......................................... 57 ALLOW USERS TO SET AND CHANGE DEFAULTS ................................................................................................ 57 LIMIT PREINSTALLED APPS TO ESSENTIALS ......................................................................................................... 58 APP STORE SEARCH TRANSPARENCY ............................................................................................................. 58 PLATFORMS SHOULD AVOID USING COMPETITORS’ PROPRIETARY DATA TO COMPETE WITH THEM ........................... 59 PROACTIVELY OFFER SECURE APIS TO FOR THIRD-PARTY DEVELOPERS FOR MAJOR NEW FEATURES ......................... 59 OBLIGATION TO ALLOW ARCHIVING / EMULATION OF OLDER SYSTEM VERSIONS .................................................. 61 ALLOW USERS TO TRANSFER AND MERGE ACCOUNTS ....................................................................................... 62 DUE PROCESS FOR DEVELOPERS ................................................................................................................... 63 GREATER BUSINESS MODEL FLEXIBILITY ............................................................................................................ 63 CONCLUSION ............................................................................................................................................ 64 1 Tending the Garden Executive Summary App stores provide security, privacy, and trust for users, while giving platform maintainers significant gatekeeper control over the software that users can access, what that software can do, and how it can be monetized. This gatekeeper control can be used to benefit platforms at the expense of independent software developers as well as users. Switching costs, network effects, and other factors mean that competition between platforms for users and developers cannot be enough to ensure that app stores and their associated software platforms will be operated in a way that promotes consumer rights, the public interest, and broader economic benefits. This paper suggests specific measures that should be implemented by dominant app stores to promote these interests—reducing the gatekeeper control that app stores inherently have, but not eliminating it. These measures are suggested as baseline structural remedies that would apply broadly, and do not fully displace the need for a competition law framework, an individualized, complaint-driven procedure that addresses matters these measures do not address, or other remedies. Specifically, this paper recommends that platforms allow users and developers to bypass the app store entirely through side-loading, but only subject to strict code- signing requirements. Code-signing ensures that only software from known developers can run on a device. At the same time, this paper suggests that code- signing authorities themselves can be decentralized. It also recommends a few measures that app stores can implement to reduce the advantage their first-party apps have over competitors, such as allowing users to change defaults, and proactively providing third-party application programming interfaces, or APIs, for major new features at a more rapid cadence. This paper also calls for app stores to allow greater business model flexibility to developers, such as allowing things like paid upgrades and not requiring the use of in-app purchase systems for media purchases and subscriptions. It calls for due process for developers to ensure consistency in the application of rules. Finally, even older versions of dominant platforms and software that run on them can be of historical and technological interest. Platforms should, therefore, ensure that it remains possible to archive and emulate software that may still be protected by copyright but is of limited commercial