By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

GadgetBond

  • Latest
  • How-to
  • Tech
    • AI
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Add GadgetBond as a preferred source to see more of our stories on Google.
Font ResizerAa
GadgetBondGadgetBond
  • Latest
  • Tech
  • AI
  • Deals
  • How-to
  • Apps
  • Mobile
  • Gaming
  • Streaming
  • Transportation
Search
  • Latest
  • Deals
  • How-to
  • Tech
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • AI
    • Anthropic
    • ChatGPT
    • ChatGPT Atlas
    • Gemini AI (formerly Bard)
    • Google DeepMind
    • Grok AI
    • Meta AI
    • Microsoft Copilot
    • OpenAI
    • Perplexity
    • xAI
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Follow US
AndroidGoogleSecurityTech

Google now lets trusted friends help you recover your account

Google is rolling out new recovery tools that let users rely on a mobile number or trusted contacts to securely recover lost or hacked accounts.

By
Shubham Sawarkar
Shubham Sawarkar's avatar
ByShubham Sawarkar
Editor-in-Chief
I’m a tech enthusiast who loves exploring gadgets, trends, and innovations. With certifications in CISCO Routing & Switching and Windows Server Administration, I bring a sharp...
Follow:
- Editor-in-Chief
Oct 15, 2025, 9:27 AM EDT
Share
We may get a commission from retail offers. Learn more
Man viewing phishing text, woman viewing "wrong password" screen, centered blue Google shield.
Image: Google
SHARE

Losing access to your Google account is one of those small modern catastrophes: photos trapped behind a sign-in wall, email you can’t read, two-factor authentication that now feels more like a stalemate than protection. This week, Google pushed back at that frustration with a set of new recovery tools that aim to make getting back in easier — and, importantly, more human. Instead of an impersonal string of security questions or chasing an old recovery email, you can now ask someone you trust to vouch for you. It’s a move that leans on relationships rather than just tech, and it raises interesting trade-offs worth unpacking.

On October 15, 2025, Google introduced Recovery Contacts — a way for eligible personal Google accounts to designate trusted friends or family who can confirm your identity and help you regain access if you’re locked out. Alongside that, Google rolled out Sign in with Mobile Number for Android (to simplify recovery when you’ve moved to a new phone), and a suite of Message-related scam protections, including a Key Verifier and more aggressive warnings for suspicious links.

Recovery Contacts: how it actually works

Google’s blog and support pages clarify the flow: you add one or more people as recovery contacts in your Google Account settings. If you later can’t sign in, you’ll be able to share a recovery code with one of those contacts. Google will notify the contact (via email or notification), and the contact can confirm that the code came from you; that confirmation helps Google accept that you’re the rightful owner and lets you get back in. The recovery contact does not get access to your account or its contents — they only confirm the code. The company positions this as a fallback for situations where standard methods (passwords, linked email, SMS codes, passkeys) aren’t available.

Four panels: Google Account recovery with a recovery contact's help.
Image: Google

Why that matters: older “trusted contacts” systems from other services sometimes required handing the contact lots of power (or the contact being awkwardly involved). Google’s approach is a lighter-weight confirmation: a code and a yes/no verification, not account control. Still, it relies on picking people you really trust — and making sure they keep their own accounts secure.

Sign in with Mobile Number: the new “phone as anchor”

Google also introduced Sign in with Mobile Number for Android devices. This feature helps when you’ve lost access to the old device and are trying to set up a new Android phone: Google can identify your account using the phone number linked to it, and — critically — it can ask for the lock-screen passcode that was used on your previous device rather than the account password. That avoids forcing a user to remember complex account credentials when the phone they used for sign-ins is gone. The feature is rolling out gradually worldwide.

A practical takeaway: this is aimed mostly at people who legitimately own a device and need to move accounts to a replacement. It is not, Google says, a password bypass for strangers — it’s a recovery path anchored to possession+knowledge (phone number + lock screen code).

Messages: Key Verifier and smarter link warnings

Part of the same announcement bundle tightens up chat security. Key Verifier lets you and a contact scan QR codes (or use the Contacts app) to cryptographically verify that the end-to-end encryption keys you’re using actually belong to the person you think you’re messaging. That helps stop impersonation attacks where someone tries to pose as a friend. Google Messages will also show stronger warnings when it detects links that look like scam or phishing attempts — an attempt to nudge people away from clicking through to harmful sites.

If you use RCS on Android, the key-verification flow is baked into Messages and the Contacts app: open a thread, tap the name, and select “Verify keys” — the other person completes the action on their end and you’ll see confirmation when keys match. It’s a simple UX for something that otherwise lives in jargon-heavy territory.

The privacy and security trade-offs

These features feel, at first glance, like sensible user-centric fixes. But toss them into the wild and several questions come up.

1. Social recovery can be strong — or risky.
Relying on friends or family introduces a human weakest link: a recovery contact’s account could be compromised, or they could be persuaded to “help” by a scammer. Google’s code-sharing flow and notification mechanics are designed to reduce that risk — the contact must explicitly confirm the shared code — but it doesn’t erase the human factor. Choose contacts who understand digital hygiene.

2. Phone-based recovery is convenient — but not a panacea.
Phone numbers are already used for account recovery and 2-step verification, but SMS has security flaws. Google’s Sign in with Mobile Number combines the phone number with a previous device’s lock code, which improves robustness; still, if an attacker controls your phone number (SIM swaps) and somehow gets details about your device lock, vulnerabilities remain. Use passkeys or an authenticator app for primary protection when possible.

3. Usability vs. security tension.
These features are clearly built to solve real pain points: forgotten passkeys, lost phones, and hair-tearing account recovery. But every convenience added to recovery pathways expands the attack surface a little. Google’s strategy seems to be to layer protections — code confirmation, device knowledge, cryptographic key checks — rather than remove safeguards. That’s a reasonable approach, but it asks users to make good choices about who they trust and how they secure linked devices.

How to set this up

If you want to add Recovery Contacts right now:

  1. Open your Google Account → Security & sign-in → Recovery contacts (you may be prompted to sign in).
  2. Add a contact (they’ll need a Google Account).
  3. Make sure that the contact knows what you’d like them to do in a recovery event (they’ll receive a notification and must confirm a recovery code).

Google’s support pages walk you through the steps and let you remove a contact anytime.

For the Key Verifier and Message protections:

  • Open Google Messages or Contacts on Android, pick a contact, and look for Verify keys in the conversation or contact settings. Follow the on-screen QR flow.

What security pros are likely to say

Security experts often favor mechanisms that combine possession (a device), knowledge (a PIN), and inherence (biometrics) — and Google’s new tools follow that multi-pronged logic. Social recovery is controversial in cryptography communities because it can be abused, but it’s also a very pragmatic fix for ordinary people who are locked out of services and lack advanced backups. Expect security commentary to stress: (a) pick trusted, security-savvy recovery contacts, (b) don’t rely on a single recovery route, and (c) keep recovery contact accounts hardened with 2FA and strong passwords.

The larger picture: Google betting on layered defenses

Viewed together, these changes show Google trying to solve two problems at once: reduce user frustration when accounts are lost, and reduce success rates for modern phishing and impersonation attacks. That’s why the announcement bundles account recovery improvements with messaging safety features. Account access and communication authenticity are two sides of the same security coin — and Google’s response is to provide multiple, overlapping ways to prove “you are you.”

Final read: is this a good thing?

Yes — for most users, these features are a helpful addition. They won’t replace best practices (use passkeys, enable 2FA, keep recovery phone numbers current), but they do provide smarter fallbacks for when things go sideways. The human element — a trusted friend confirming a code — may feel a little odd to people used to digital-only flows, but for many, it will be the difference between getting back into years of stored photos and being locked out permanently. As always, the power of these features depends on the choices users make: pick trusted contacts, secure those contacts’ accounts, and treat phone-based recovery as one piece of a larger security strategy.


Discover more from GadgetBond

Subscribe to get the latest posts sent to your email.

Most Popular

Anthropic’s revamped Claude Code desktop app is all about parallel coding workflows

OpenAI loses three top executives in a single day

Claude Opus 4.7 is Anthropic’s new powerhouse for serious software work

Google Chrome’s new Skills feature makes AI workflows one tap away

Gemini CLI just got subagents and your workflows will never be the same

Also Read
Adobe Firefly AI Assistant

Adobe launches Firefly AI Assistant to handle multi-step creative tasks for you

DJI Osmo Pocket 4 gimbal

DJI Osmo Pocket 4: 1-inch sensor, 4K/240fps, smart tracking

Garmin D2 Mach 2 Pro aviator smartwatch

Garmin launches D2 Mach 2 Pro aviator watch with built-in inReach

Samsung Micro RGB TV R95H

Samsung’s Micro RGB TVs roll out in the US with sizes from 55 to 115 inches

Samsung 46‑foot Onyx cinema LED display

Samsung unveils 14-meter Onyx cinema LED for premium large theaters

Samsung Galaxy Tab A11+ Kids Edition

Galaxy Tab A11+ Kids Edition gives kids their own tablet and parents real control

Adobe illustration

Adobe vs everyone: inside the new creative software war

A person wearing Meta Quest 3 mixed reality headset

Quest 3 and 3S get surprise price hike in the middle of a RAM crunch

Company Info
  • Homepage
  • Support my work
  • Latest stories
  • Company updates
  • GDB Recommends
  • Daily newsletters
  • About us
  • Contact us
  • Write for us
  • Editorial guidelines
Legal
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • DMCA
  • Disclaimer
  • Accessibility Policy
  • Security Policy
  • Do Not Sell or Share My Personal Information
Socials
Follow US

Disclosure: We love the products we feature and hope you’ll love them too. If you purchase through a link on our site, we may receive compensation at no additional cost to you. Read our ethics statement. Please note that pricing and availability are subject to change.

Copyright © 2026 GadgetBond. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | Do Not Sell/Share My Personal Information.