Advertisement
Guest User

Untitled

a guest
May 20th, 2018
2,406
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 51.14 KB | None | 0 0
  1. ACCESS_ALL_DOWNLOADS
  2. access all system downloads Network Allows an app to access all downloads in the system via the /all_downloads/ URIs. The protection level could be relaxed in the future to support third-party download managers.
  3.  
  4. ACCESS_ALL_EXTERNAL_STORAGE
  5. access external storage of all users Development Tools Allows the app to access external storage for all users.
  6.  
  7. ACCESS_CHECKIN_PROPERTIES
  8. Access check-in properties Location Allows read/write access to the "properties" table in the (Unix security) checkin database, to change values that get uploaded.
  9.  
  10. ACCESS_COARSE_LOCATION
  11. Approximate location (network-based) Location Allows an app to access approximate location derived from network location sources such as cell towers and Wi-Fi.
  12. This permission is usually used by applications that display location based ads by publishers like Admob (Google).
  13.  
  14. ACCESS_DOWNLOAD_MANAGER
  15. Access download manager.Network Allows the app to access the download manager and to use it to download files. Malicious apps can use this to disrupt downloads and access private information.
  16. Only accessible by system apps
  17.  
  18. ACCESS_DOWNLOAD_MANAGER_ADVANCED
  19. Advanced download manager functions.Network Allows the app to access the download manager's advanced functions. Malicious apps can use this to disrupt downloads and access private information.
  20.  
  21. ACCESS_DRM
  22. Access DRM content Allows application to access DRM-protected content.
  23.  
  24. ACCESS_FINE_LOCATION
  25. Precise location (GPS and network-based) Location Allows an app to access precise location from location sources such as GPS, cell towers, and Wi-Fi.
  26. This permission can be used by applications that display location based ads by publishers like Admob (Google). It is also used by applications that want your exact location. Examples would be Navigation applications, "Check-In" apps like 4square.
  27.  
  28. ACCESS_LOCATION_EXTRA_COMMANDS
  29. Access extra location provider commands Location good example for poor documentation, as even books on Android application development state: The Android documentation doesn’t tell us which location commands are “extra,” so we’ll ask for all of them.
  30. The documentation of Locus Map gives a hint, though: allows disabling the A-GPS data status and forcing system to load new.
  31.  
  32. ACCESS_MOCK_LOCATION
  33. mock location sources for testing Location Allows an application to create mock location providers for testing, and is intended for development use in e.g. the Android Emulator (to save the dev from having to run around to check if positions are displayed correctly). Cases where this is needed in an app ready for endusers should be rare.
  34. Requires "Allow mock locations" to be enabled in developer options
  35.  
  36. ACCESS_NETWORK_STATE
  37. View network connections Network Allows applications to access information about networks, including if a network is available (or just connecting), what type of network the device is connected to, if any (WiFi, 3G, LTE), if it's in Roaming, and also reasons for a failed connection attempt (if any).
  38. Good use: The application may check the state of your connection before trying to access the internet, and e.g. restrict itself to WiFi for some actions.
  39. Bad use: Only in combination with other permissions (e.g. data collection for profiling).
  40.  
  41. ACCESS_NOTIFICATION_POLICY
  42. Marker permission for applications that wish to access notification policy.Enables an app to toggle your notification policy, e.g. Do Not Disturb. Runtime Permission; i.e. user must at least confirm this once.
  43.  
  44. ACCESS_NOTIFICATIONS
  45. Access notifications System Tools Allows the app to retrieve, examine, and clear notifications, including those posted by other apps.
  46. This permission is reserved for system apps. It was introduced with Android 4.3 as part of the new Notification Service.
  47.  
  48. ACCESS_SUPERUSER
  49. Use root privileges System Tools An app with this permission obviously wants to use "root powers". This permission requested or not, no app automatically gets granted those "root powers"; but some "SuperUser apps" can be configured to ignore requests by all apps not having it. For all (other) apps, the user has to acknowledge their legitimity at least on the first request. Thus an app with this permission does not automatically have root permission – but only obtains them when the user explicitely approves that to the "SuperUser app".
  50. Warning: an app with root-powers can do pretty much anything to your system. So better be sure you trust its developer (and your installation source) that far.
  51.  
  52. ACCESS_SURFACE_FLINGER
  53. Access SurfaceFlinger System Tools Allows an application to use SurfaceFlinger's low level features.
  54. SurfaceFlinger is part of Android's media framework. It provides a compositor which takes care for rendering in frame buffers (so this has to do with graphics).
  55.  
  56. ACCESS_WEATHERCLOCK_PROVIDER
  57. Access Huawei WeatherClock data This permission allows accessing data of the Huawei Content Provider for WeatherClock. For details, please see Android.SE.
  58.  
  59. ACCESS_WIFI_STATE
  60. View Wi-Fi connections Network This could be requested by any application that uses internet access. The application may check the state of your connection before trying to access the internet.
  61. It's comparable to ACCESS_NETWORK_STATE, just for WiFi.
  62.  
  63. ACCESS_WIMAX_STATE
  64. View WIMAX connections Network Allows the app to determine whether WiMAX is enabled and information about any WiMAX networks that are connected.
  65. ACCOUNT_MANAGER Act as the AccountManagerService Accounts Allows applications to call into AccountAuthenticators. Only the system can get this permission.
  66. An account-manager is the service working behind the scenes and taking care everything works as expected.
  67. This permission is reserved for system apps.
  68. For details, take a look at the Stack Exchange article What does permission “MANAGE_ACCOUNTS” mean?
  69.  
  70. ACTIVITY_RECOGNITION
  71. Activity recognition Personal Information Allows an app to receive periodic updates of your activity level from Google,for example, if you are walking, driving, cycling, or stationary. This is part of Google Play Services ActivityRecognitionClient.
  72. According to the API reference, the app doesn't receive any coordinates this way, but rather the type of the detected activity – e.g. WALKING, RUNNING, or STILL.
  73.  
  74. ADD_VOICEMAIL
  75. Add Voicemail Voice Mailbox Allows the app to add messages to your voicemail inbox.
  76.  
  77. adm.permission.RECEIVE
  78. Receive Amazon Device Messaging notifications Network Allows apps to accept cloud to device messages sent by the app's service (Amazon Device Messaging – like GoogleCloudMessaging). Using this service will incur data usage.
  79. ANT Connect to ANT sensors
  80. Network Allow to connect to ANT and ANT+ sensors. For what ANT is about, see Wikipedia and the ANT Android page.
  81.  
  82. ANT_ADMIN
  83. Manage ANT connections Network Allow to manage connections to ANT and ANT+ sensors. For what ANT is about, see Wikipedia and the ANT Android page.
  84.  
  85. AUTHENTICATE_ACCOUNTS
  86. Create accounts and set passwords Accounts Allows an application to act as an AccountAuthenticator for the AccountManager. This is for applications that would authenticate you to their service.
  87. An app using this permission usually provides an interface to deal with a certain account type (which is not known by the pre-installed Android system), such as Dropbox. As shipped, Android does not know how to login to Dropbox and how to deal with a Dropbox account – so the Dropbox app provides the mechanism. Additionally, an "account authenticator" might restrict the actions an app can perform with the account (so it would e.g. be possible to administrate this via some web interface offered by the service). More details can be found e.g. in this Stack Exchange post.
  88.  
  89. BACKUP Control system backup and restore
  90. Permits an app to manage backups of another app. This e.g. includes to tell the BackupManager that: data of that app have changed (dataChanged()), all backups of that app should be deleted (clearBackupData()), or backups for that app should be (de)activated.
  91.  
  92. BACKUP_DATA
  93. Participate in the system backup and restore Allows the application to participate in the system's backup and restore mechanism.
  94. Packages that do not use android.
  95. permission.BACKUP_DATA
  96. will neither be backed up nor restored. This seems to be an old (and possibly deprecated?) permission, as a commit message of August 2009 describes: In the future if access to the backup/restore infrastructure is made available to arbitrary 3rd party applications, the permission checks (and indeed, the permission itself) can simply be removed, and another one of February 2010 confirms: Any package can now participate in backup/restore, without requiring any manifest-declared permission.
  97.  
  98. badge.permission.READ
  99. Read notification badges com.sec.android.provider.badge.* refer to the so called "Badge Provider", which is responsible for drawing numbers on your homescreen/lockscreen icons for e.g. missed calls or pending messages. Not clear to me is why an app must read these numbers; couldn't it simply tell the service to add/remove a given number to/from icon X?
  100. For some details, please take a look at this Stack Exchange article.
  101. Might be a permission specific to Samsung Touchwiz (with "sec" referring to the "seclauncher"); not sure whether other devices are affected by it.
  102. badge.permission.WRITE Write notification badges no 0 0 Enables an app to paint numbers on icons, using the "Badge Service" described with badge.permission.READ.
  103.  
  104. BATTERY_STATS
  105. Read battery statistics System Tools Allows an application to collect battery statistics. Battery widgets and other battery information tools use this permission.
  106.  
  107. BIND_ACCESSIBILITY_SERVICE
  108. Bind to an Accessibility Service Accessibility Allows the holder to bind to the top-level interface of an accessibility service. Must be required by an AccessibilityService, to ensure that only the system can bind to it.
  109.  
  110. BIND_APPWIDGET
  111. Choose Widgets Personal Information Allows an application to tell the AppWidget service which application can access AppWidget's data. The normal user flow is that a user picks an AppWidget to go into a particular host, thereby giving that host application access to the private data from the AppWidget app. An application that has this permission should honor that contract. Very few applications should need to use this permission.
  112.  
  113. BIND_DEVICE_ADMIN
  114. Interact with device admin System Tools Allows the holder to send intents to a device administrator. Must be required by device administration receiver, to ensure that only the system can interact with it.
  115.  
  116. BIND_INPUT_METHOD
  117. Bind to an Input Method System Tools Allows the holder to bind to the top-level interface of an input method. Must be required by an InputMethodService, to ensure that only the system can bind to it.
  118. BIND_JOB_SERVICE
  119. run the application's scheduled background work System Tools This permission gives access to the JobService and allows the Android system to run the application in the background when requested.
  120.  
  121. BIND_NFC_SERVICE
  122. Bind NFC Service System Tools Must be required by a hostApduService or OffHostApduService to ensure that only the system can bind to it.
  123.  
  124. BIND_NOTIFICATION_LISTENER_SERVICE Bind Notification Listener Service System Tools Must be required by an NotificationListenerService, to ensure that only the system can bind to it.
  125.  
  126. BIND_PRINT_SERVICE
  127. Bind Print Service System Tools Must be required by a PrintService, to ensure that only the system can bind to it.
  128.  
  129. BIND_REMOTEVIEWS
  130. Bind to a widget service System Tools Allows the holder to bind to the top-level interface of a widget service. Must be required by a RemoteViewsService, to ensure that only the system can bind to it.
  131.  
  132. BIND_TEXT_SERVICE Bind to a Text Service System Tools Allows the holder to bind to the top-level interface of a text service (e.g. SpellCheckerService). Must be required by a TextService to ensure that only the system can bind to it.
  133.  
  134. BIND_VPN_SERVICE
  135. Bind to a VPN service System Tools Allows the holder to bind to the top-level interface of a Vpn service. Must be required by a VpnService, to ensure that only the system can bind to it.
  136.  
  137. BIND_WALLPAPER
  138. Bind to wallpaper System Tools Allows the holder to bind to the top-level interface of wallpaper. Must be required by a WallpaperService, to ensure that only the system can bind to it.
  139.  
  140. BLUETOOTH
  141. Pair with Bluetooth devices Bluetooth Allows applications to connect to paired bluetooth devices.
  142. Typical applications that would need bluetooth access include: sharing applications, file transfer apps, apps that connect to headset or wireless speakers.
  143.  
  144. BLUETOOTH_ADMIN
  145. Access Bluetooth settings Bluetooth Allows applications to discover and pair bluetooth devices.
  146.  
  147. BLUETOOTH_PRIVILEGED
  148. Bluetooth Privileged Bluetooth Allows applications to pair bluetooth devices without user interaction. This is not available to third party applications.
  149.  
  150. BODY_SENSORS
  151. body sensors (like heart rate monitors) Personal Information Allows the app to access data from sensors you use to measure what's happening inside your body, such as heart rate.
  152.  
  153. BRICK (HAHAHA WOW MAY LIBRENG 500 TB TO)
  154. Permanently disable phone System Tools si 0 5 Required to be able to disable the device (very dangerous!). Not available to 3rd party apps – and seemingly even not used anywhere, see Why do some apps request too many permissions?.
  155.  
  156. BROADCAST_DATA_MESSAGE
  157. Broadcast data messages to apps Network Can broadcast data messages received from the Internet to apps registered to listen for them. Reserved to system apps.
  158.  
  159. BROADCAST_PACKAGE_ADDED
  160. Send Package Added Broadcast System Tools Allows an application to broadcast a notification that an application package has been added.
  161.  
  162. BROADCAST_PACKAGE_REMOVED
  163. Send package removed broadcast System Tools Allows an application to broadcast a notification that an application package has been removed.
  164.  
  165. BROADCAST_SMS
  166. Send SMS-received broadcast Messages Allows an application to broadcast an SMS receipt notification.
  167.  
  168. BROADCAST_STICKY
  169. Send Sticky Broadcasts System Tools Allows an application to broadcast sticky intents. These are broadcasts whose data is held by the system after being finished, so that clients can quickly retrieve that data without having to wait for the next broadcast.
  170. The permission has to do with how applications "talk" to each other using a communication method called Intents. While this permission is highly technical it is a relatively low importance. There are no know obvious malicious uses for this permission.
  171.  
  172. BROADCAST_WAP_PUSH
  173. Send WAP-PUSH-received broadcast Messages Allows an application to broadcast a WAP PUSH receipt notification.
  174. Not for use by third-party applications.
  175.  
  176. c2dm.permission.RECEIVE
  177. Receive data from Internet network Allows apps to accept cloud to device messages sent by the app's service (GoogleCloudMessaging). Using this service will incur data usage. Malicious apps could cause excess data usage.
  178.  
  179. c2dm.permission.SEND
  180. Send data to Internet network Allows apps to send cloud to device messages (GoogleCloudMessaging). Using this service will incur data usage.
  181.  
  182. CALL_PHONE
  183. Directly call phone numbers Phone Calls Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call being placed.
  184. This permission is of high importance. This could let an application call a 1-900 number and charge you money. However, this is not as common a way to cheat people in today's world as it used to be. Legitimate applications that use this include: Google Voice and Google Maps.
  185. Another important point to note here is that any app can launch the phone screen and pre-fill a number for you. However, in order to make the call, you would need to press "Send" or "Call" yourself. The difference with this permission is that an app could make the entire process automatic and hidden.
  186.  
  187. CALL_PRIVILEGED
  188. Directly call any phone numbers Phone Calls Allows an application to call any phone number, including emergency numbers, without going through the Dialer user interface for the user to confirm the call being placed. For technical details, see CALL_PHONE.
  189.  
  190. CAMERA
  191. Take pictures and videos Camera Required to be able to access the camera device.
  192.  
  193. CAPTURE_AUDIO_OUTPUT
  194. Capture audio output Allows an application to capture audio output. Not for use by third-party applications.
  195. Requested e.g. by Google Play Services.
  196.  
  197. CAPTURE_SECURE_VIDEO_OUTPUT
  198. Capture Secure Video Output Allows an application to capture secure video output. Not for use by third-party applications.
  199. Requested e.g. by Google Play Services.
  200.  
  201. CAPTURE_VIDEO_OUTPUt
  202. Capture Video Output Allows an application to capture video output. Not for use by third-party applications.
  203. Requested e.g. by Google Play Services
  204.  
  205. CHANGE_BACKGROUND_DATA_SETTING
  206. Change background data usage setting Network Allows the app to change the background data usage setting.
  207.  
  208. CHANGE_COMPONENT_ENABLED_STATE
  209. Enable or disable app components System Tools Allows an app to change whether an application component (other than its own) is enabled or not.
  210. Malicious apps may use this to disable important device capabilities. Care must be used with this permission, as it is possible to get app components into an unusable, inconsistent, or unstable state
  211.  
  212. CHANGE_CONFIGURATION
  213. Change system display settings Development Tools Allows an application to modify the current configuration, such as locale.
  214.  
  215. CHANGE_NETWORK_STATE
  216. Change network connectivity Network Allows applications to change network connectivity state.
  217. Good Cop: Enable network connection only when needed, according to the requirements of the user.
  218. Bad Cop: Cause extra costs (especially when in roaming) just for mischievous glee; secretly transfer data (in conjunction with INTERNET)
  219.  
  220. CHANGE_WIFI_MULTICAST_STATE
  221. Allow Wi-Fi Multicast reception Effects on Battery Life Allows applications to enter Wi-Fi Multicast mode. This allows to send data packages to multiple recipients simultaneously, without using additional bandwidth. Useful e.g. for streaming servers supporting multiple clients. It also enables to receive network packages not intended for the own device (sniffing).
  222. Uses more power than non-multicast-mode.
  223.  
  224. CHANGE_WIFI_STATE
  225. Connect and disconnect from Wi-Fi network Allows applications to change Wi-Fi connectivity state. Think of it as CHANGE_NETWORK_STATE for WiFi.
  226.  
  227. CHANGE_WIMAX_STATE
  228. Change WiMAX state Network Allows the app to connect the device to and disconnect the device from WiMAX networks.
  229. CHANGE_NETWORK_STATE for WIMAX. Also can apply changes to configured WIMAX networks.
  230.  
  231. CLEAR_APP_CACHE
  232. Delete all app cache data System Tools Allows an application to clear the caches of all installed applications on the device.
  233.  
  234. CLEAR_APP_USER_DATA
  235. Delete other apps data System Tools Allows an application to clear user data.
  236.  
  237. COLLECT_METRICS
  238. Collect customer metrics Permits an app to collect customer metrics for Amazon, on how an app is used. This permission is bound to the Amazon Metrics Service Application (com.amazon.client.metrics) and thus only granted with that app installed.
  239.  
  240. CONFIGURE_SIP
  241. Full access to SIP Accounts/Calls/Messages Phone Calls Configure SIP accounts and settings, access to SIP contents (call logs, messages...), extends and hook SIP flow.
  242. A malicious app with this permission can cause additional costs by e.g. configuring a costly SIP service.
  243.  
  244. CONNECTIVITY_INTERNAL
  245. Use privileged ConnectivityManager API Network Allows an internal user to use priviledged ConnectivityManager APIs.
  246.  
  247. CONTROL_LOCATION_UPDATES
  248. Control Location Updates Location Allows enabling/disabling location update notifications from the radio. Not for use by normal applications.dashclock.permission.
  249.  
  250. READ_EXTENSION_DATA
  251. request DashClock extension data Allows requesting DashClock extension data.
  252.  
  253. DELETE_CACHE_FILES
  254. Delete other apps cache System Tools Allows an application to delete cache files. Not for use by third-party applications.
  255.  
  256. DELETE_PACKAGES
  257. Delete apps System Tools Allows an application to delete packages. Not for use by third-party applications.
  258.  
  259. DEVICE_POWER
  260. Device Power Management System Tools Allows low-level access to power management. Not for use by third-party applications.
  261.  
  262. DIAGNOSTIC
  263. Read/write to resources owned by diag System Tools Allows the app to read and write to any resource owned by the diag group; for example, files in /dev.
  264. This could potentially affect system stability and security. This should be ONLY be used for hardware-specific diagnostics by the manufacturer or operator. It's not intended for use by third-party applications.
  265.  
  266. DISABLE_KEYGUARD
  267. Disable your screen lock Screenlock Allows applications to disable the keyguard.
  268. This permission is of medium-high importance. It allows an app to disable the "lock screen" that most phones go into after going to sleep and been turned on again. This lockscreen can sometimes be a password screen, or a PIN screen, or just a "slide to unlock" screen.
  269.  
  270. DOWNLOAD_WITHOUT_NOTIFICATION
  271. Download files without notification Network no 0 Allows to queue downloads without a notification shown while the download runs.
  272. Good Cop: A PodCast player could use this to preload content without "spamming" the notification area.
  273. Bad Cop: Download malware modules in background without the user´s notice.
  274.  
  275. DUMP
  276. Retrieve system internal state Development Tools Allows an application to retrieve state dump information from system services. Not for use by third-party applications.
  277. The information accessible with this permission is most likely comparable of that retrieved by the dumpsys command-line tool. Evil apps could theoretically use this to access private and protected data.
  278.  
  279. email.ACCESS_PROVIDER
  280. Access email provider data Messages Allows this application to access your email database, including received messages, sent messages, usernames and passwords. Not available to third-party apps.
  281.  
  282. EXPAND_STATUS_BAR Expand/collapse status bar Status bar Allows an application to expand or collapse the status bar.
  283. This appears to be a system permission – not for use by regular applications.
  284.  
  285. FACTORY_TEST
  286. Factory Test System Tools Run as a manufacturer test application, running as the root user. Only available when the device is running in manufacturer test mode.
  287.  
  288. FLASHLIGHT
  289. Control flashlightEffects on Battery Life Allows access to the flashlight.
  290.  
  291. FORCE_BACK
  292. Force app to close System Tools Allows the app to force any activity that is in the foreground to close and go back.
  293.  
  294. FORCE_STOP_PACKAGE
  295. force stop other apps System Tools Allows the app to forcibly stop other apps. Should be reserved for system apps. Malicious apps could use this to disable security apps.
  296.  
  297. FREEZE_SCREEN
  298. freeze screen System Tools Allows the application to temporarily freeze the screen for a full-screen transition. This permission is provided by the Android OS itself, and is not available to third-party-apps.
  299.  
  300. GALLERY_PROVIDed
  301. wala akong mahanap na info kaya sa tingin ko ito ay permission is required to access multimedia data via the gallery content provider.
  302.  
  303. GET_ACCOUNTS
  304. Find accounts on the device Accounts Allows access to the list of accounts in the Accounts Service
  305.  
  306. GET_APP_OPS_STATS
  307. Retrieve app ops statistics System Tools Allows the app to retrieve collected application operation statistics. Not for use by normal apps.
  308.  
  309. GET_PACKAGE_SIZe
  310. Measure app storage space System Tools Allows an application to find out the space used by any package.
  311. This permission does not seem to have any risk associated with it.
  312.  
  313. GET_TASK
  314. Retrieve running apps App Information Allows an application to get information about the currently or recently running tasks: a thumbnail representation of the tasks, what activities are running in it, etc.
  315.  
  316. GET_TOP_ACTIVITY_INFO
  317. Get Top Activity Info App Information Allows an application to retrieve private information about the current top activity, such as any assist context it can provide. Not for use by third-party applications.
  318.  
  319. GLOBAL_SEARCH Global Search System Tool This permission can be used on content providers to allow the global search system to access their data. Typically it used when the provider has some permissions protecting it (which global search would not be expected to hold), and added as a read-only permission to the path in the provider where global search queries are performed. This permission can not be held by regular applications; it is used by applications to protect themselves from everyone else besides global search.
  320.  
  321. GLOBAL_SEARCH_CONTROL
  322. Global search control System Tools Allows the application to control the global search. Not available to third party apps.
  323.  
  324. GOOGLE_AUTH View
  325. configured accounts Accounts Allows apps to see the usernames (email addresses) of the Google account(s) you have configured.
  326. Good Cop: List accounts for the user to chose from when using a Google service
  327. Bad Cop: Sniff and snoop, find "valid mail adresses" to abuse for other purposes (e.g. spamming)
  328.  
  329. GOOGLE_AUTH
  330. Google mail Accounts Allows apps to sign in to Google mail services using the account(s) stored on this Android device.
  331. Good Cop: Automatic sign-in to use Google Services in the interest of the user
  332. Bad Cop: Secretly sign-in without the user´s notice to e.g. send spam or spying on personal data
  333.  
  334. GOOGLE_AUTH.wise
  335. Google Spreadsheets Accounts Allows apps to sign in to Google Spreadsheets using the account(s) stored on this Android device.
  336. Good Cop: Automatic sign-in to use Google Services in the interest of the user
  337. Bad Cop: Secretly sign-in without the user´s notice to e.g. spy on personal data
  338.  
  339. GOOGLE_AUTH
  340. writely Google Docs Accounts Allows apps to sign in to Google Docs using the account(s) stored on this Android device.
  341. Good Cop: Automatic sign-in to use Google Services in the interest of the user
  342. Bad Cop: Secretly sign-in without the user´s notice to e.g. spy on personal data
  343.  
  344. GOOGLE_PHOTOS
  345. handle photos backed up to G+ This permission is required to access photos backed up to G+
  346.  
  347. google.MAPS_RECEIVe
  348. receive map material from Google Maps Network If an app wants to integrate maps from Google Maps, it needs this permission (along with READ_GSERVICES, INTERNET and WRITE_EXTERNAL_STORAGE).
  349.  
  350. GTALK_SERVICE
  351. Google Talk Service Messages I couldn´t find any documentation on this permission, which is connected to Google Talk resp. Google Hangouts.
  352. The protection level assigned seems to differ between devices.
  353.  
  354. HARDWARE_TEST
  355. Test Hardware Hardware Controls Allows access to hardware peripherals. Intended only for hardware testing.
  356.  
  357. im.permission.READ_ONLY
  358. read instant messages Messages This is a permission realated to reading instant messages, such as those on GoogleTalk.
  359.  
  360. INJECT_EVENTS
  361. Press keys and control buttons System Tools Allows an application to inject user events (keys, touch, trackball) into the event stream and deliver them to ANY window.
  362.  
  363. INSTALL_DRM
  364. Install DRM content System Tools Allows app to install DRM-protected content.
  365. DRM stands for Digital Rights Management, sometimes also called "Digital Restriction Management". It is used to control (and restrict) access to media – e.g. by Google Books, Google Movies, or Amazon‘s Kindle.
  366.  
  367. INSTALL_LOCATION_PROVIDER
  368. Install Location Provider Location Create mock location sources for testing or install a new location provider into the Location Manager. This allows the app to override the location and/or status returned by other location sources such as GPS or location providers. Reserved to system apps.
  369.  
  370. INSTALL_PACKAGES
  371. Directly install apps System Tools Allows the app to install new or updated Android packages. Malicious apps may use this to add new apps with arbitrarily powerful permissions. Not for use by third-party applications.
  372.  
  373. INSTALL_SHORTCUT
  374. Install Shortcuts Allows an application to install a shortcut in Launcher (Homescreen).
  375.  
  376. INTERACT_ACROSS_USERS
  377. Interact Across Users Allows an application to call APIs that allow it to do interactions across the users on the device, using singleton services and user-targeted broadcasts. This permission is not available to third party applications.
  378.  
  379. INTERACT_ACROSS_USERS_FULL
  380. Full license to interact across users System Tools Fuller form of INTERACT_ACROSS_USERS that removes restrictions on where broadcasts can be sent and allows other types of interactions.
  381.  
  382. INTERNAL_SYSTEM_WINDOW
  383. Internal System Window System Tools Allows an application to open windows that are for use by parts of the system user interface. Not for use by third party apps.
  384.  
  385. INTERNET
  386. Full network access Network Allows applications to open network sockets. Any application that accesses the internet for any reason will have to request this permission.
  387. This is of course required to loads ads (which is why most apps request this), but can also be used to spy on personal data. Special caution is advised when this permission is requested at the same time as others which access personal data.
  388.  
  389. k9.permission.DELETE_MESSAGES
  390. Delete messages from K-9 Mail Messages Enables an app to delete mails stored in K-9 Mail
  391.  
  392. k9.permission.READ_ATTACHMENT
  393. Read K-9 Mail attachments messages This is a custom permission for the K-9 Mail app.
  394.  
  395. k9.permission.READ_MESSAGES
  396. Read mails stored in K-9 Mail Messages Enables an app to read mails stored with the K-9 Mail app. Be aware mails can contain sensible personal information!
  397.  
  398. KILL_BACKGROUND_PROCESSES
  399. Close other apps System Tools Allows an application to call killBackgroundProcesses(String).
  400.  
  401. launcher.permission.UPDATE_COUNt
  402. Updating Notification Counts Access the notification API of Apex Launch This permission just enables an app to provide counter information to the launcher. Usually this is done by mail apps. No risks known so far.
  403.  
  404. launcher.WRITE_SETTINGS
  405. write Home settings and shortcuts System Tools The permissions allow an application to modify configuration settings of Android’s Launcher, including that of icons.
  406. Malicious apps could use this to place (misleading) icons on your homescreen – e.g. one looking like the Playstore – to lure you into actions you otherwise wouldn´t perform.
  407.  
  408. LOCATION_HARDWARE
  409. Access Location hardware Allows an application to use location features in hardware, such as the geofencing api. Not for use by third-party applications.
  410.  
  411. MANAGE_ACCOUNTS
  412. Add or remove accounts Accounts Allows an application to manage the list of accounts in the AccountManager.
  413.  
  414. MANAGE_APP_TOKENs
  415. Manage App Tokens Accounts Allows an application to manage (create, destroy, Z-order) application tokens in the window manager. This is only for use by the system.
  416.  
  417. MANAGE_DEVICE_ADMINS
  418. add or remove a device admin System Tools Allows the holder to add or remove active device administrators. Should never be needed for normal apps.
  419.  
  420. MANAGE_DOCUMENTS
  421. Manage Documents Storage Allows an application to manage access to documents, usually as part of a document picker.
  422.  
  423. MANAGE_MTP
  424. Manage MTP Hardware Controls Allows an application to access the MTP USB kernel driver. For use only by the device side MTP implementation.
  425.  
  426. MANAGE_USB
  427. Manage preferences and permissions for USB devices Hardware Controls Allows an application to manage preferences and permissions for USB devices. Restricted to system apps.
  428.  
  429. MANAGE_USERS
  430. manage users System Tools Allows apps to manage users on the device, including query, creation and deletion. This permission is not available to third party applications.
  431.  
  432. MASTER_CLEAR
  433. Master Clear Allows an app to perform a "master clear" (i.e. factory reset) of the device. Restricted to system apps. Restricted to system apps.
  434.  
  435. MEDIA_CONTENT_CONTROL
  436. control media playback and metadata access Allows an application to know what content is playing and control its playback. Not for use by third-party applications due to privacy of media consumption.
  437.  
  438. MMS_SEND_OUTBOX_MSG MMS Wakeup
  439. Messages Sends out all MMSs from the outbox to the network. Restricted to system apps and those signed with the same key as the ROM.
  440.  
  441. MODIFY_AUDIO_SETTINGS
  442. Change your audio settings Hardware Controls Allows an application to modify global audio settings.
  443.  
  444. MODIFY_PHONE_STATE
  445. Modify Phone State Phone Calls Modify the status of phone functionality: power, MMI codes (call forwarding, Caller ID) – not to initiate calls. But the network could be switched (to a different carrier, roaming) or the radio (de)activated, without informing the user. The permission can also be used to intercept incoming calls.
  446.  
  447. MOUNT_FORMAT_FILESYSTEMS
  448. Erase USB storage System Tools Allows formatting file systems for removable storage.
  449. The primary danger with this permission is that it could be used to erase data from an SD card or other similar storage in your phone. This is also not a permission any normal app should need.
  450.  
  451. MOUNT_UNMOUNT_FILESYSTEMS
  452. Access USB storage filesystem System Tools Allows mounting and unmounting file systems for removable storage.
  453. This permission just allows for connecting to SD cards for reading and writing. While not a risk itself, this is also not a permission any normal app should need.
  454.  
  455. MOVE_PACKAGE
  456. Move app resources System Tools Allows an application to move application resources from internal to external media and vice versa.
  457.  
  458. PACKAGE_USAGE_STATS
  459. Update component usage statistics System Tools Allows the modification of collected component usage statistics. Not for use by normal applications.
  460. Most likely refers to app statistics, e.g. how often an app was started.
  461.  
  462. PERFORM_CDMA_PROVISIONING
  463. Start CDMA phone settings Allow applications to launch CDMA services (a telephony functionality). Reserved to system apps.
  464.  
  465. PERSISTENT_ACTIVITY
  466. Make app always run App Information Allow an application to make its activities persistent.
  467.  
  468. PREVENT_POWER_KEY
  469. Change behaviour of the power key Hardware Controls Allows an application to override the default behaviour for the power key.
  470.  
  471. PROCESS_OUTGOING_CALLS
  472. Reroute outgoing calls Phone Calls Allows an application to monitor, modify, or abort outgoing calls.
  473.  
  474. RAISED_THREAD_PRIORITY
  475. Raised thread priority System Tools Allows the application procedures to obtain the priority of the an elevated the thread. This might be required for e.g. real-time audio/video playback. Malicious apps could however use this to slow down the system.
  476.  
  477. READ_ATTACHMENT
  478. Read email attachments Personal Information This is a custom permission for the default Android email app (i.e. not Gmail). This permission should be treated with great caution. Many email attachments contain highly sensitive and personal or financial information.
  479.  
  480. READ_CALENDAR
  481. Read calendar events plus confidential information Personal Information Allows an application to read the user's calendar data.
  482.  
  483. READ_CALL_LOg
  484. Read Call Logs Personal Information Allows an application to read the user's call log.
  485.  
  486. READ_CLIPBOARD
  487. Read clipboard contents System Tools An app with this permission can read clipboard contents – that is, everything you copy into the clipboard (including passwords, if you copy them). Some more detailed background and preventive measures can be found in the following XDA article: How to Stop Apps from Reading the Android Clipboard to Protect your Privacy (dated 8/2017).
  488. READ_CONTACTS
  489. Read your contacts Personal InformationAllows an application to read the user's contacts data.
  490.  
  491. READ_CONTENT_PROVIDER
  492. Access mail information Messages This is primarily for access to information on Mails in Gmail. Developers can use this content provider to display label information to the user.
  493.  
  494. READ_EXTERNAL_STORAGE
  495. Read the contents of your usb storage Storage Allows an application to read from external storage. This permission was granted to all apps by default up to Android 4.3. This changed with Android 4.4 (API level 19), which now requires that applications explicitly request read access using this permission.
  496.  
  497. READ_FRAME_BUFFER
  498. Read Frame Buffer System Tools Allows an application to take screen shots and more generally get access to the frame buffer data.
  499.  
  500. READ_GMAIL
  501. Read Gmail Messages Protection level switched from "dangerous" to "signature" about the time Gingerbread was released (with Gmail 2.3.5), see Android Census – so it's not available to third-party apps (anymore)
  502.  
  503. READ_GMAIL_PROVIDER
  504. Read Gmail Messages Also see: READ_GMAIL. Checking the full permission name,
  505.  
  506. READ_GSERVICES
  507. Read Google service configuration Accounts Allows an app to read the Google services map. Not for use by normal apps.
  508.  
  509. READ_HISTORY_BOOKMARKS
  510. Read your Web bookmarks and history Personal Information Allows an application to read (but not write) the user's browsing history and bookmarks.
  511.  
  512. READ_INPUT_STATE
  513. Record what you type and actions that you take System Tools Allows an application to retrieve the current state of keys and switches, including to watch the keys that you press even when interacting with another app (such as typing a password). This is only for use by the system.
  514.  
  515. READ_LOGS
  516. Read sensitive log data Development Tools Allows an application to read the low-level system log files.
  517. This allows the application to read what any other applications have logged, which might contain sensitive (and even personal) data.
  518.  
  519. READ_MEDIA_STORAGE
  520. Read internal media storage contents Storage.
  521.  
  522. READ_OWNER_DATa
  523. Read owner data Personal Information Read access to owner data saved on the device
  524.  
  525. READ_PHONE_STATE
  526. Read phone status and identity Phone Calls Allows read only access to phone state.
  527.  
  528. READ_PROFILE
  529. Read your own contact card Personal Information Allows an application to read the user's personal profile data.
  530. This is a new permission that relates to a special new "Me" contact you can create in your phone or tablet as your own profile.
  531.  
  532. READ_SECURE_SETTINGS
  533. Read Secure Settings Hardware Controls Allows an application to read the secure system settings.
  534.  
  535. READ_SETTINGS
  536. Read Home settings and shortcuts System Tools Allows the app to read the settings and shortcuts in Home.
  537. Bad Cop: Android Icon Hijacking
  538. Good Cop: That would need the corresponding WRITE_SETTINGS permission
  539.  
  540. READ_SMS
  541. Read your text messages (SMS or MMS) Messages Allows an application to read SMS messages.
  542.  
  543. READ_SOCIAL_STREAM
  544. Read your social stream Social Information Allows an application to read from the user's social stream.
  545. This is a new permission introduced with Android 4.0 (Ice Cream Sandwhich).
  546.  
  547. READ_SYNC_SETTINGS
  548. Read sync settings Sync settings Allows applications to read the sync settings.
  549.  
  550. READ_SYNC_STATS
  551. Read sync statistics Sync settings Allows applications to read the sync stats for an account, including the history of sync events and how much data is synced.
  552.  
  553. READ_USER_DICTIONARY Read terms you added to the dictionary User Dictionary da 0 0 Allows an application to read the user dictionary. This should really only be required by an IME, or a dictionary editor like the Settings app.
  554.  
  555. REAL_GET_TASKS
  556. Retrieve running tasks App Information Get running tasks/apps. Replaces GET_TASKS with API level 21+ (Lollipop)
  557.  
  558. REBOOT
  559. Reboot System Tools Required to be able to reboot the device. Not for use by third-party applications.
  560.  
  561. RECEIVE_BOOT_COMPLETED
  562. Run at startup App Information Allows an application
  563.  
  564. RECEIVE_EMERGENCY_BROADCAST
  565. Receive Emergency Broadcast Messages Allows an application to receive emergency cell broadcast messages, to record or display them to the user. Reserved for system apps.
  566.  
  567. RECEIVE_MMS
  568. Receive text messages (MMS) Messages Allows an application to monitor incoming MMS messages, to record or perform processing on them.
  569.  
  570. RECEIVE_SMS
  571. Receive text messages (SMS) Messages Allows an application to monitor incoming SMS messages, to record or perform processing on them.
  572.  
  573. RECEIVE_USER_PRESENT
  574. receive USER_PRESENT broadcast I couldn't find any documentation on this permission – so I cannot even tell if it really exists.
  575.  
  576. RECEIVE_WAP_PUSH
  577. Receive text messages (WAP) Messages Allows an application to monitor incoming WAP push messages.
  578. Sending and receiving MMS is based on WAP. The information that there‘s a MMS message available for download, is sent as WAP Push to the device.
  579.  
  580. RECORD_AUDIO
  581. Record audio Microphone Allows an application to record audio.
  582.  
  583. REORDER_TASKS
  584. Reorder running apps System Tools Allows an application to change the Z-order of tasks. Malware could use this to push some ads o.a. into foreground to be displayed to the user
  585.  
  586. REQUEST_INSTALL_PACKAGES
  587. Allows an application to request installing packages. System Tools Allows an application to request installing packages.
  588.  
  589. RESTART_PACKAGES
  590. Restart other applications System Tools Restart other apps.
  591.  
  592. SEND_DOWNLOAD_COMPLETED_INTENTS
  593. Allows the app to send notifications about completed downloads.
  594.  
  595. SEND_RESPOND_VIA_MESSAGE
  596. Send respond-via-message events Messages Allows an application (Phone) to send a request to other applications to handle the respond-via-message action during incoming calls. Not for use by third-party applications.
  597. This most likely refers to the possibility to reject incoming calls with an SMS
  598.  
  599. SEND_SMS
  600. Send SMS messages Messages Allows an application to send SMS messages.
  601.  
  602. SEND_SMS_NO_CONFIRMATION
  603. Send SMS with no confirmation Messages Allows an application to send SMS messages via the Messaging app with no user input or confirmation
  604.  
  605. SET_ACTIVITY_WATCHER
  606. Monitor and control all app launching System Tools Allows an application to watch and control how activities are started globally in the system.
  607.  
  608. SET_ALARM
  609. Set an alarm Device Alarms Allows an application to broadcast an Intent to set an alarm for the user.
  610. This permission seems to be of low risk because it doesnt allow the setting of the alarm directly. Rather it allows the opening of the alarm app on the phone.
  611.  
  612. SET_ALWAYS_FINISH
  613. Force background apps to close Development Tools Allows an application to control whether activities are immediately finished when put in the background.
  614.  
  615. SET_ANIMATION_SCALE
  616. Modify global animation speed System Tools Modify the global animation scaling factor (faster or slower animations). Not for use by third-party applications.
  617.  
  618. SET_DEBUG_APP
  619. Enable app debugging Development Tools Configure an application for debugging. Not for use by third-party applications.
  620. Gives an app the opportunity to enable debugging for other apps.
  621.  
  622. SET_ORIENTATION
  623. Change screen orientation System Tools Allows low-level access to setting the orientation (actually rotation) of the screen. Not for use by normal applications.
  624.  
  625. SET_POINTER_SPEED
  626. Change pointer speed System Tools Allows the app to change the mouse or touch pad pointer speed at any time. Not for use by normal applications.
  627.  
  628. SET_PREFERRED_APPLICATIONS
  629. Set preferred Apps System Tools Assign default apps. No longer useful. Deprecated with API level 7, it no longer has any effect.
  630. SET_PROCESS_LIMIT Limit number of running processes Development Tools Allows an application to set the maximum number of (not needed) application processes that can be running. Not for use by third-party applications.
  631.  
  632. SET_TIME
  633. Set Time System clock Allows applications to set the system time. Not for use by third-party apps.
  634.  
  635. SET_TIME_ZONE
  636. Set time zone System clock Allows applications to set the system time zone. Should pose no risk (except you maybe late to work).
  637.  
  638. SET_WALLPAPER
  639. Set Wallpaper Wallpaper Allows applications to set the wallpaper
  640.  
  641. SET_WALLPAPER_COMPONE
  642. Setting live wallpapers System Tool
  643.  
  644. SET_WALLPAPER_HINTs
  645. Adjust your wallpaper size Wallpaper Allows applications to set the wallpaper hints. Lacking documentation, the best guess is this is about settings for size and position.
  646.  
  647. SHUTDOWN
  648. Partial shutdown System Tools Allows an app to put the activity manager into the closed state; does not perform a complete shutdown. Reserved to system apps.
  649.  
  650. SIGNAL_PERSISTENT_PROCESSES
  651. Send Linux signals to apps Development Tools Allow an application to request that a signal be sent to all persistent processes. Not for use by third-party applications.
  652.  
  653. STATUS_BAR
  654. Enable/Disable status bar System Tools Allows an application to open, close, or disable the status bar and its icons. Not for use by third-party applications.
  655.  
  656. STATUS_BAR_SERVICE
  657. Status bar System Tools Allows an application to be the status bar. Reserved for system apps.
  658. According to StackOverflow: The STATUS_BAR_SERVICE permission is used for apps that what to be the actual status bar. This is a protected permission so unless you're building your own ROM that includes replacing the status bar then I don't think this is the permission you want.
  659.  
  660. STOP_APP_SWITCHES
  661. Prevent app switches System Tools Prevent users from switching to another application. Reserved to system apps.
  662.  
  663. SUBSCRIBED_FEEDS_READ
  664. Read subscribed feeds System Tools Allows an application to allow access the subscribed feeds ContentProvider.
  665. This would give an app access to RSS feeds that you have subscribed to.
  666.  
  667. SUBSCRIBED_FEEDS_WRITE
  668. Write subscribed feeds System Tools his would give an app write access to RSS feed that you have subscribed to. See also SUBSCRIBED_FEEDS_READ.
  669.  
  670. SYSTEM_ALERT_WINDOW
  671. Draw over other apps Display Allows an application to open windows using the type TYPE_SYSTEM_ALERT, shown on top of all other applications.
  672. This permission allows an app to show a "popup" window above all other apps, even if the app is not in the foreground.
  673.  
  674. TRANSMIT_IR
  675. Use IR Transmitter effects on Battery Life Allows using the device's IR transmitter, if available. Useful for infrared remote controls.
  676.  
  677. UNINSTALL_SHORTCUT
  678. Uninstall shortcuts Allows an application to uninstall a shortcut in Launcher (Homescreen). See INSTALL_SHORTCUT.
  679.  
  680. UPDATE_APP_OPS_STATS
  681. modify app ops statistics System Tools Enables an app to change collected application operation statistics. Not for use by normal apps.
  682.  
  683. UPDATE_DEVICE_STATS
  684. Update device statistics System Tools Allows an application to update device statistics. Not for use by third party apps.
  685.  
  686. USE_CREDENTIALS
  687. Use accounts on the device Accounts Allows an application to request authtokens from the AccountManager.
  688. This app may use the "credentials" to log into an account. In most cases, "credentials" just means the corresponding authenticator creates a fitting token and hands that over (though, how to deal with that is left to the authenticator).
  689.  
  690. USE_FINGERPRINT
  691. Allows an app to use fingerprint hardware. Hardware Controls Allows an app to use fingerprint hardware, but does not give the requesting app access to the enrollment/fingerprint administration flow.
  692. USE_SIP Make/receive Internet calls Phone Calls da 0 2-3 Use SIP for internet telephony.
  693.  
  694. USES_POLICY_FORCE_LOCK
  695. Immediately lock the screen Screenlock Make the device lock immediately, as if the lock screen timeout has expired – but also limit the maximum lock timeout for the device. The "POLICY" part suggests a device manager.
  696. vending.
  697.  
  698. BILLINg
  699. In-app billing Cause costs This permission is of very high importance. It allows an application to directly bill you for services through Google Play.
  700.  
  701. CHECK_LICENSE
  702. Google Play License check Network Needed to verify the validity of the app's license against Google services. Should only be found with payed apps, but poses no risk with others either.
  703.  
  704. VIBRATE
  705. Control vibration Effects on Battery Life Allows access to the vibrator.
  706. As it states, this permission lets an app control the vibrate function on your phone. This includes for incoming calls and other events.
  707.  
  708. WAKE_LOCK
  709. Prevent device from sleeping Effects on Battery Life Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
  710.  
  711. WRITE_APN_SETTINGS
  712. Change/intercept network settings and traffic System Tools Allows an application to change network settings and to intercept and inspect all network traffic, for example to change the proxy and port of any APN.
  713.  
  714. WRITE_CALENDAR
  715. Add or modify calendar events and send email to guests without owners Personal Information Allows an application to write (but not read) the user's calendar data.
  716.  
  717. WRITE_CALL_LOG
  718. Write call log Personal Information dAllows the app to modify your phone's call log, including data about incoming and outgoing calls.
  719.  
  720. WRITE_CONTACTS
  721. Modify your contacts Personal Information Allows an application to write (but not read) the user's contacts data.
  722.  
  723. WRITE_EXTERNAL_STORAGE
  724. Modify or delete the contents of your USB storage Storage Allows an application to write to external storage.
  725.  
  726. WRITE_GMAIL
  727. Modify Gmail Messages Permits an app to change your E-Mails in Google Mail. This includes sending and deleting.
  728. Assigned protection level differs between devices (dangerous/signature)
  729. WRITE_GSERVICES
  730. Write GServices Accounts Allows an application to modify the Google service map. Not for use by third-party applications.
  731.  
  732. WRITE_HISTORY_BOOKMARKS
  733. Write web bookmarks and history Personal Information Allows an application to write (but not read) the user's browsing history and bookmarks.
  734.  
  735. WRITE_MEDIA_STORAGE
  736. Modify/delete internal media storage contents Storage Allows an application to modify the contents of the internal media storage.
  737.  
  738. WRITE_OWNER_DATA
  739. Write Owner data Personal Information Write/change owner data. The API reference not only gives no closer information, but not even mentions the permission at all. A guess is it refers to the owner data one can place on the lock screen
  740.  
  741. WRITE_PROFILE
  742. Modify your own contact card Personal Information This a new permission that relates to a special new "Me" contact you can create in your phone or tablet as your own profile. It's the counter-part to READ_PROFILE.
  743.  
  744. WRITE_SECURE_SETTINGS
  745. Modify secure system settings Development Tools Allows an application to read or write the secure system settings.
  746. This permission should only be seen on Android system apps (and possibly wireless carriers or hardware manufacturer pre-installed apps).
  747.  
  748. WRITE_SETTINGS
  749. Modify system settings System Tools Allows an application to read or write the system settings.
  750. Global settings are pretty much anything you would find under Android's main 'settings' window. However, a lot of these settings may be perfectly reasonable for an application to change. Typical applications that use this include: volume control widgets, notification widgets, settings widgets, Wi-Fi utilities, or GPS utilities. Most apps needing this permission will fall under the "widget" or "utility" categories/types.
  751.  
  752. WRITE_SMS
  753. Edit your text messages (SMS or MMS) Messages Allows an application to write SMS messages.
  754. This permission appears to be an offshoot from the "send SMS" permission. This should allow an app to write, but not send an SMS message. Users should still be cautious of this permission however. Many kinds of malware lure users into sending SMS to special for-pay numbers costing them money.
  755. WRITE_SOCIAL_STREAM Write to your social stream Social Information da 0 Allows an application to write (but not read) the user's social stream data. Malware could use this to spread messages on behalf of the user.
  756.  
  757. WRITE_SYNC_SETTINGS
  758. Toggle sync on and off Sync settings da Allows applications to write the sync settings.
  759. This permission relates to backup and sync of certain types of information like contacts. It allows an app to write settings for how that account and the data are sync and backed up. This is a common permission for social services or contact managers or any other type of app with an account associated with it. Alone, this permission doesn't allow an app access to contacts or other sensitive data. Rather, it just relates to how that data is backed up. Nevertheless, care should be taken as always.
  760.  
  761. WRITE_USER_DICTIONARY
  762. Add words to user-defined dictionary User Dictionary no Allows an application to write to the user dictionary.
  763. This alows an app to add custom words to your user dictionary, so auto-correction will consider it the next time you type it. See also READ_USER_DICTIONARY.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement