diff --git a/prebuilts/api/26.0/26.0.ignore.cil b/prebuilts/api/26.0/26.0.ignore.cil
index 5d7623321f2aee989a2d240d0a3f2bd087f34c02..d5660c74c3ea36eca46da6f536cea91b1461532c 100644
--- a/prebuilts/api/26.0/26.0.ignore.cil
+++ b/prebuilts/api/26.0/26.0.ignore.cil
@@ -10,7 +10,6 @@
     hal_tetheroffload_hwservice
     kmsg_debug_device
     memcg_device
-    netd_stable_secret_prop
     sysfs_fs_ext4_features
     timezone_service
     tombstoned_java_trace_socket))
diff --git a/private/property_contexts b/private/property_contexts
index 8eb2f28b268205519818a351f70e8735d1307748..23150343f13181084f4aec044fc5befb89bda66f 100644
--- a/private/property_contexts
+++ b/private/property_contexts
@@ -50,7 +50,6 @@ persist.logd.logpersistd        u:object_r:logpersistd_logging_prop:s0
 logd.logpersistd        u:object_r:logpersistd_logging_prop:s0
 persist.log.tag         u:object_r:log_tag_prop:s0
 persist.mmc.            u:object_r:mmc_prop:s0
-persist.netd.stable_secret      u:object_r:netd_stable_secret_prop:s0
 persist.sys.            u:object_r:system_prop:s0
 persist.sys.safemode    u:object_r:safemode_prop:s0
 ro.sys.safemode         u:object_r:safemode_prop:s0
diff --git a/public/netd.te b/public/netd.te
index 77974bf40fb0647f0fe9b189af0063c6cbefc12e..691887fcd39e56743135d50fb66b5d054e3c6850 100644
--- a/public/netd.te
+++ b/public/netd.te
@@ -62,7 +62,6 @@ allow netd dnsmasq:process signal;
 allow netd clatd:process signal;
 
 set_prop(netd, ctl_mdnsd_prop)
-set_prop(netd, netd_stable_secret_prop)
 
 # Allow netd to publish a binder service and make binder calls.
 binder_use(netd)
@@ -109,11 +108,3 @@ neverallow netd { app_data_file system_data_file }:dir_file_class_set write;
 neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find;
 neverallow { domain -system_server -dumpstate } netd:binder call;
 neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call;
-
-# persist.netd.stable_secret contains RFC 7217 secret key which should never be
-# leaked to other processes. Make sure it never leaks.
-neverallow { domain -netd -init } netd_stable_secret_prop:file r_file_perms;
-
-# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
-# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
-neverallow { domain -netd -init } netd_stable_secret_prop:property_service set;
diff --git a/public/property.te b/public/property.te
index 95efcaa78976be57be0316702a3810b5d954aa33..daac0fb5c6836f4aaac4add0cf5ed4d3d68e0653 100644
--- a/public/property.te
+++ b/public/property.te
@@ -30,7 +30,6 @@ type log_tag_prop, property_type, log_property_type;
 type mmc_prop, property_type;
 type net_dns_prop, property_type;
 type net_radio_prop, property_type, core_property_type;
-type netd_stable_secret_prop, property_type;
 type nfc_prop, property_type, core_property_type;
 type overlay_prop, property_type;
 type pan_result_prop, property_type, core_property_type;