> nothing is stopping a malware vendor from literally never reusing app IDs.
Or form using the ID of another vendor.
> and it can even require some form of developer identification, it just can't be very deep identification, an e-mail address is enough (along with IP and other metadata gathered during the process).
I expect the typical malware writer will easily find a way to have a unique “e-mail address (along with IP and other metadata gathered during the process)”.
Because of that, “That way they can disable all apps signed by one developer” will not be possible.