Guest User

Untitled

a guest
Jul 12th, 2018
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.34 KB | None | 0 0
  1. Permissions
  2. This application has access to the following:
  3.  
  4. Your location
  5. fine (GPS) location
  6. Access fine location sources such as the Global Positioning System on the device, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
  7. coarse (network-based) location
  8. Access coarse location sources such as the cellular network database to determine an approximate device location, where available. Malicious applications can use this to determine approximately where you are.
  9. Network communication
  10. full Internet access
  11. Allows an application to create network sockets.
  12. Your personal information
  13. read Browser's history and bookmarks
  14. Allows the application to read all the URLs that the Browser has visited, and all of the Browser's bookmarks.
  15. write Browser's history and bookmarks
  16. Allows an application to modify the Browser's history or bookmarks stored on your device. Malicious applications can use this to erase or modify your Browser's data.
  17. Phone calls
  18. read phone state and identity
  19. Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
  20. Storage
  21. modify/delete USB storage contents modify/delete SD card contents
  22. Allows an application to write to the USB storage. Allows an application to write to the SD card.
  23. System tools
  24. prevent device from sleeping
  25. Allows an application to prevent the device from going to sleep.
  26.  
  27. Hide
  28.  
  29. Hardware controls
  30. control vibrator
  31. Allows the application to control the vibrator.
  32. Your location
  33. access extra location provider commands
  34. Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.
  35. Network communication
  36. view network state
  37. Allows an application to view the state of all networks.
  38. System tools
  39. automatically start at boot
  40. Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the application to slow down the overall device by always running.
Add Comment
Please, Sign In to add comment