Somebody in the technical know-how feel free to weigh in and validate or dismiss this as a worthy paranoid hypothesis or not...
Is it possible or at least worth considering some cleaver Google data exfiltration technique by hooking it in to an app (Play Store) which has full networking permissions?
Been experiencing the same here. And after I clicked update, it has recently been giving me tons of memory tagging crashes mid-usage (pre update clicking it did not.) And yet I'm still seeing a spinning pending app update today.
Perhaps as an experiment I'll uninstall it, reinstall from Aurora to simulate a 'last public release' sterility (in case they are invisibly tarnishing the Play GBard somehow) and see if anything changes again then.
I mean. It's a keylogger at the end of the day. Google wants all the strokes. I have no doubt Google is very highly aware and interested in the minority user base (that's us!) that locks themselves down with sandboxing and firewalling to avoid their dragnet.
It's the best keylogger keyboard I've enjoyed using on Android. So I've continued using it locked down with no networking. But if there's risk something can still be leaked or extracted, it's just gonna have to be time for re-evaluation. I'd prefer to quell my curiosities about this topic sooner than later honestly.. Chime in.