HI ,
NOTE ::- Its more of a question than INFO .
Did anyone noticed about the permissions requested by the apps .... here is the list of permissions requested .
Can these be misused ????
1) HARDWARE CONTROLS
CHANGE YOUR AUDIO SETTINGS
Allows the app to modify global audio settings such as volume and routing.
2) NETWORK COMMUNICATION
FULL INTERNET ACCESS
Allows the app to create network sockets.
3) PHONE CALLS
READ PHONE STATE AND IDENTIT Y
Allows the app to access the phone features of the device. An app with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
4) STORAGE
MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTE
Allows the app to write to the USB storage. Allows the app to write to the SD card.
Which of them can be dangerous according to you .
Thanks
AG
More permissions
5) SYSTEM TOOLS
DISPLAY SYSTEM-LEVEL ALERTS
Allows the app to show system alert windows. Malicious apps may take over the entire screen.
PREVENT TABLET FROM SLEEPING PREVENT PHONE FROM SLEEPING
Allows the app to prevent the tablet from going to sleep. Allows the app to prevent the phone from going to sleep.
RETRIEVE RUNNING APPS
Allows the app to retrieve information about currently and recently running tasks. Malicious apps may discover private information about other apps.
6) YOUR LOCATION
COARSE (NETWORK-BASED) LOCATION
Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious apps may use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious apps may use this to determine approximately where you are.
FINE (GPS) LOCATION
Access fine location sources such as the Global Positioning System on the tablet, where available. Malicious apps may use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. Malicious apps may use this to determine where you are, and may consume additional battery power.
7) YOUR PERSONAL INFORMATION
READ SENSITIVE LOG DATA
Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
8) SERVICES THAT COST YOU MONEY
DIRECTLY CALL PHONE NUMBERS
Allows the app to call phone numbers without your intervention. Malicious apps may cause unexpected calls on your phone bill. Note that this doesn't allow the app to call emergency numbers.
NOTE ::- Its more of a question than INFO .
Did anyone noticed about the permissions requested by the apps .... here is the list of permissions requested .
Can these be misused ????
1) HARDWARE CONTROLS
CHANGE YOUR AUDIO SETTINGS
Allows the app to modify global audio settings such as volume and routing.
2) NETWORK COMMUNICATION
FULL INTERNET ACCESS
Allows the app to create network sockets.
3) PHONE CALLS
READ PHONE STATE AND IDENTIT Y
Allows the app to access the phone features of the device. An app with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
4) STORAGE
MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTE
Allows the app to write to the USB storage. Allows the app to write to the SD card.
Which of them can be dangerous according to you .
Thanks
AG
More permissions
5) SYSTEM TOOLS
DISPLAY SYSTEM-LEVEL ALERTS
Allows the app to show system alert windows. Malicious apps may take over the entire screen.
PREVENT TABLET FROM SLEEPING PREVENT PHONE FROM SLEEPING
Allows the app to prevent the tablet from going to sleep. Allows the app to prevent the phone from going to sleep.
RETRIEVE RUNNING APPS
Allows the app to retrieve information about currently and recently running tasks. Malicious apps may discover private information about other apps.
6) YOUR LOCATION
COARSE (NETWORK-BASED) LOCATION
Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious apps may use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious apps may use this to determine approximately where you are.
FINE (GPS) LOCATION
Access fine location sources such as the Global Positioning System on the tablet, where available. Malicious apps may use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. Malicious apps may use this to determine where you are, and may consume additional battery power.
7) YOUR PERSONAL INFORMATION
READ SENSITIVE LOG DATA
Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
8) SERVICES THAT COST YOU MONEY
DIRECTLY CALL PHONE NUMBERS
Allows the app to call phone numbers without your intervention. Malicious apps may cause unexpected calls on your phone bill. Note that this doesn't allow the app to call emergency numbers.
Last edited: