• Cervical mucus
  • Cervical position
  • Ovulation test results
  • Floor changes
  • Menstruation
  • Vaginal spotting

I must reiterate that some of the fields above may be more complicated than they sound and expect quite a bit of information while others may be fairly simple. It's also possible many of them will not have a user interface in the Fit app for either editing or even viewing, so third-party apps may still be the only way to make use of these.

While Google Fit v2.0 may be directly linked to the release of Android Wear v2.0 (for obvious reasons), I think it's safe to assume Google will dedicate a blog post to the changes in the Google Fit API, so we'll get more in-depth details shortly.

code

FIDO authentication tokens

These days, the absolute worst account to have compromised is your email. It contains tons of archived information and serves as a primary method for resetting forgotten passwords on other services. The risks of a compromised email address, assuming it's one that matters, can be pretty severe. This is why it's always recommended that users set up 2-factor authentication (2FA). Most people will choose single-use TOTP codes for 2FA, generated by apps like Google Authenticator or Authy because they're free and relatively convenient.

For those logging in on a laptop or desktop computer, one alternative is to use a physical authentication key that plugs into a USB port and generates similar single-use codes. These use a standard created by the FIDO Alliance. If you have to generate codes often, this is definitely the faster way to do it, and it's arguably more secure than relying on some other methods.

These devices originally only worked through a USB connection, but in 2015, new standards were drafted to support communication over NFC and Bluetooth (and BLE). This removed the hurdle of plugging in one of these keys into a device that didn't have a USB port, or possibly no ports at all. That was the physical hurdle, but the software had to support it too. Now it looks like Google has taken care of the software side. There are dozens of new strings related to the use of FIDO-certified security keys and communicating with them through NFC and Bluetooth.

code

There's really very little to say about the strings themselves, they are just standard instructions for using this type of security token wirelessly. The significance is simply that the strings are there.

So, what does this all mean? Let's say your Google account is protected by 2FA and you've registered a key with NFC capabilities, like this one from Yubico. The next time you want to set up a new phone, you'll be able to enter your account name and password, then instead of getting a code out of Google Authenticator or Authy, you can hold your security key up to the NFC reader and immediately authenticate yourself.

Ok, it might not sound that special if you aren't in the right situation, but it's pretty cool if you have to authenticate every time you log in and that turns out to be a common occurrence. For example, Facebook basically requires its employees to use these.

Download

The APK is signed by Google and upgrades your existing app. The cryptographic signature guarantees that the file is safe to install and was not tampered with in any way. Rather than wait for Google to push this download to your devices, which can take days, download and install it just like any other APK.

Version: 10.2.91