![]() ![]() For example, this can determine whether the People app is synced with an account.Īllows an app to modify the sync settings for an account. This may include any accounts created by applications you have installed.Īllows the app to perform operations like adding and removing accounts, and deleting their password.Īllows the app to read the sync settings for an account. This may cause other apps to stop running.Īllows the app to set the system wallpaper.Īllows the app to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.Īllows the app to get the list of accounts known by the device. This may allow the app to discover information about which applications are used on the device.Īllows the app to end background processes of other apps. Malicious apps may corrupt your system's configuration.Īllows the app to retrieve information about currently and recently running tasks. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.Īllows the app to change the state of network connectivity.Īllows the app to modify the system's settings data. Modify or delete the contents of your USB storageĪllows the app to write to the USB storage.Īllows the app to modify global audio settings such as volume and which speaker is used for output.Īllows the app to prevent the device from going to sleep.Īllows the app to view the configuration of Bluetooth on the device, and to make and accept connections with paired devices.Īllows the app to configure the local Bluetooth device, and to discover and pair with remote devices.Īllows the app to disable the keylock and any associated password security. Malicious apps may cost you money by making calls without your confirmation. Note that this doesn't allow the app to call emergency numbers. This may result in unexpected charges or calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.Īllows the app to call phone numbers without your intervention. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.Īllows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to delete contact data.Īllows the app to access the phone features of the device. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.Īllows the app to modify the data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific contacts. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.Īllows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.Īllows the app to view information about network connections such as which networks exist and are connected.Īllows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. On Mobile, use “Find on page” to search for Apps / Games links on this page.Allows the app to create network sockets and use custom network protocols. If you are using PC, just use CTRL+F and type few first letters from the App / Game’s name to navigate to the required App / Game download link. ![]() ![]() How to Search for an App / Game link on this Page: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |