Nexus 6 is a relatively old smartphone (and just recently reached end of life for full software updates from Google), but it still gets its monthly security updates. That’s great, except for the fact that this month the Nexus 6 security over-the-air update is actually breaking a security feature for many users. As it should, the Mountain View company has pulled the update until further notice.

This all started with reports across the web that the update was breaking Android Pay for users, including a handful in the Nexus 6 subreddit. The real situation here, though, is that the update seems to be breaking SafetyNet, which is software that makes sure that unlocked or otherwise modified phones aren’t able to run certain apps with sensitive data — like Android Pay.

In response, Google has been replying to plenty of Nexus 6 owners on Twitter saying that they’re “aware of this issue and our team is investigating.” The update has also been pulled from Google’s factory image website and the OTA website.

If you’re a Nexus 6 owner and your Android Pay app recently broke, this is probably why. And while I can’t make any guarantees (I don’t work for Google, contrary to the belief of some), I think it’s likely that you’ll be getting another over-the-air update in the coming days that fixes the issue. If you didn’t update to the March security patch, then lucky you — you probably won’t have to deal with this.

(via Android Police)


FTC: We use income earning auto affiliate links. More.

Check out 9to5Google on YouTube for more news:

You’re reading 9to5Google — experts who break news about Google and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Google on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

About the Author

Stephen Hall

Stephen is Growth Director at 9to5. If you want to get in touch, follow me on Twitter. Or, email at stephen (at) 9to5mac (dot) com, or an encrypted email at hallstephenj (at) protonmail (dot) com.