Home Wiki

Bloatware

View on consumerrights.wiki ↗

Citations needed
Some claims in this article have not been independently sourced.
Contents12
  1. How it works
  2. Why it is a problem
  3. Non-removable
  4. Tracking and advertising
  5. Unsafety
  6. Poor performance
  7. Ecosystem damage
  8. Ethical and moral concerns
  9. Examples
  10. Tools to deal with bloat
  11. External links
  12. References

Bloatware can be defined in 2 main classes:

While the term "bloatware" is commonly ascribed to software, hardware bloat also exists.[1] See IoT devices for examples.

How it works

Bundled features often arise as pre-installed software and applications, because the device manufacturer (OEM) has a contract or partnership with another corporation. The terms and processes leading to these partnerships, however, lack transparency.

Software that gets bloated across updates typically happens because of negligence, but can also arise due to lack of resources (time, money, etc...) and external factors (such as libraries with feature creep).

Bloat can be a symptom of a decline in quality of devices and services, colloquially referred to as enshittification.

Why it is a problem

Non-removable

All major OSes (iOS, Windows, Android, etc...) don't allow removing, uninstalling, or disabling, bloatware; they only allow disabling a very narrow set of apps.

Many Android device manufactures have taken extreme measures to prevent users from disabling trivial apps, even via ADB (a tool designed for developers and power-users). Some OEMs, such as Samsung, are known to artificially introduce bogus dependencies between apps, so that if a user disables an undesired app it also breaks basic features of the system.[citation needed - unfounded accusation]

MS Windows is well-known for preventing the disabling of apps such as Internet Explorer and Edge, even when the user already has an alternative browser installed.

Tracking and advertising

One study determined that personal data collection and user tracking was prevalent in pre-installed apps, with the data collection including personally identifying info (PII) and geo-location data, personal email and phone call metadata, contacts, behavioral and usage statistics as well as isolated malware samples.[2]

Unsafety

Bloat, in any of its forms, raises privacy and security concerns[3]. As a rule of thumb, every added branch of code can make a program exponentially harder to prove for correctness[4], making it impractical or impossible to verify that a program is not malicious (such as spyware) or has an exploitable vulnerability. The problem is exacerbated if the source-code of the app is not available, since reverse engineering is difficult and (in some cases) illegal. This means that user is unable to control or ensure the safety of their devices.

Poor performance

Bloat is known for causing sub-par user experience (UX):

  • Increased latency, "slowness", when using programs and applications[5]
  • High memory use prevents or impedes multitasking[6]
  • High power usage increases energy bills and reduces battery lifespan
  • Over reliance on network connections (e.g., internet) preventing data from being cached locally[7], which can both impede access as well as increase cellular-data billing
  • Instability issues due to difficulty in testing and verifying big code-bases[8]

Ecosystem damage

If non-sustainable energy sources are used to power these devices with bloatware, bloat can contribute to climate change. This is true for any excessive processing (CPU, GPU, etc.) and network abuse (such as AI training). Hardware bloat can increase e-waste.

Ethical and moral concerns

Bloated software can be prohibitively expensive to use on developing countries, which marginalizes poor people.[9][10] Bloated software and hardware can have such a low performance (or have high instability) that it can't effectively help the user achieve the task that the product was designed for, such as scheduling a session with a therapist.[11]

Examples

  • Examples of "desirable" software with much feature-creep are modern GUI web-browsers.[12] This has lead to alternative "web-space" projects being created, such as Gemini.[13]
  • The most popular example on Windows is Candy Crush, which is either preinstalled or pseudo-installed (only the icon is shown, but the app must be downloaded). MS also allows OEMs to bundle extra apps.
  • On Android, while many users use the main Facebook app, most devices come with several hidden "stubs" such as "Facebook App Installer", "Facebook Services", "Facebook App Manager", etc... Some of those run in the background regardless of whether the user is logged-in or has the main app enabled.[14]
  • Many Samsung devices have 3rd-party integration with GIF and "sticker" providers in the Keyboard app, such as Bitmoji and Giphy.[15]

Tools to deal with bloat

This is a list of tools that can be used (or are primarily used) to reduce bloat:

  • uBlock Origin (uBO). A general-purpose content blocker for web-browsers. It's worth noting that its "Cosmetic Filtering" (element hiding) can, in rare cases (such as animated elements), improve performance.[16]
  • NoScript. Much more specialized than uBO, as it only deals with JavaScript.
  • LibRedirect. On-browser (client-side) redirector of popular websites to privacy-respecting alternatives (alts). Most of those alts are lightweight, so it can be used to avoid bloat rather than remove bloat.
  • privacy.sexy. A tool for improving security and privacy on popular operating-systems, it also serves as a "debloater".
  • Android debloaters:
    • Universal Android Debloater Next Generation (UAD-NG). A desktop app that uses ADB to disable (or "freeze") and pseudo-uninstall almost (OEMs block some) any app (including system packages) without root-access.
    • Canta. An Android app that uses UAD-NG's bloat-lists as its knowledge-base (KB), and Shizuku as ADB replacement.
    • AppManager. An "all-in-one"/general-purpose package manager that runs on Android. It uses a derivative of UAD's lists as its KB. It can show a lot of hidden info about apps, which can sometimes be used for reverse-engineering.
    • Droidrunco, superseded by Zilch
  • NetGuard. An app that uses the local Android VPN API to filter internet traffic (like a firewall). It can be used as an on-device Pi-hole to block ads using hosts-files as rules.[17]
  • Rethink, DNS + Firewall + VPN for Android. Can use local and remote DNS.
  • youtube-dl & YT-DLP. Audio/Video downloaders or "rippers". Similarly to LibRedirect, it can be used to avoid bloat, by simply downloading the main content of a page. There's also --get-url/--print urls options that can be used to open the URL of the media in a browser, effectively streaming it, without a customized player

Note that those tools only help users, they don't reduce bloat on the development side.

References

  1. Ionescu, Bogdan (2025-09-13). "Hosting a WebSite on a Disposable Vape". BogdanTheGeek's Blog. Archived from the original on 9 Feb 2026. Retrieved 2026-01-15.
  2. J. Gamba, M. Rashed, A. Razaghpanah, J. Tapiador and N. Vallina-Rodriguez, "An Analysis of Pre-installed Android Software," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 1039-1055, doi: 10.1109/SP40000.2020.00013. https://ieeexplore.ieee.org/document/9152633 Accessed 26 Feb 2026. (Archived)
  3. Hubert, Bert (2024-02-08). "Why Bloat Is Still Software's Biggest Vulnerability". IEEE Spectrum. Archived from the original on 31 Jan 2026. Retrieved 2025-11-21.
  4. Howard, Gavin (2024-03-26). "What Computers Cannot Do: The Consequences of Turing-Completeness". Gavin D. Howard. Archived from the original on 2025-12-14. Retrieved 2026-01-06.
  5. "Web performance". MDN.{{cite web}}: CS1 maint: url-status (link) (Archived)
  6. "Thrashing (computer science)". Wikipedia.{{cite web}}: CS1 maint: url-status (link) (Archived)
  7. "Local-first software: You own your data, in spite of the cloud". Ink & Switch. 2019. Archived from the original on 30 Jan 2026.
  8. Muratori, Casey (2018-05-12). "The Thirty Million Line Problem". Molly Rocket. Retrieved 2026-03-15 – via YouTube.{{cite web}}: CS1 maint: url-status (link)
  9. Luu, Dan. "How web bloat impacts users with slow connections". Retrieved 2026-03-24.{{cite web}}: CS1 maint: url-status (link)
  10. Luu, Dan. "How web bloat impacts users with slow devices". Retrieved 2026-03-24.{{cite web}}: CS1 maint: url-status (link)
  11. Bailey, Eric (2023-02-01). "Modern Health, frameworks, performance, and harm". Archived from the original on 2026-02-08. Retrieved 2026-03-24.
  12. DeVault, Drew (2020-03-18). "The reckless, infinite scope of web browsers". Retrieved 2026-04-21.
  13. "Project Gemini FAQ § Why not just use a subset of HTTP and HTML?". 2 Sep 2023. Retrieved 2026-04-21.
  14. https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation/blob/644b30ae73c0f86fb5b99173c88132fc4bb1e1b8/resources/assets/uad_lists.json#L13903-L13942
  15. https://news.samsung.com/global/samsung-breathes-new-life-into-emojis-with-the-galaxy-s9-and-s9-plus
  16. "html - Does hiding an animated GIF with CSS conserve browser resources?". Stack Overflow. 2016-02-03. Archived from the original on 2025-12-15. Retrieved 2026-03-15.
  17. Bokhorst, Marcel (2016-03-20). "Ad Blocking with NetGuard". GitHub. Retrieved 2026-03-15.{{cite web}}: CS1 maint: url-status (link)