wmsha/streing
-
Allows the app to change whether a component of another app is enabled or not. Malicious apps may use this to disable important phone capabilities. Care must be used with this permission, as it is possible to get app components into an unusable, inconsistent, or unstable state.
Allows the app to change whether a component of another app is enabled or not. Malicious apps may use this to disable important phone capabilities. Care must be used with this permission, as it is possible to get app components into an unusable, inconsistent, or unstable state.
-
grant or revoke permissions
grant or revoke permissions
-
Allows an application to grant or revoke specific permissions for it or other applications. Malicious applications may use this to access features you have not granted them.
Allows an application to grant or revoke specific permissions for it or other applications. Malicious applications may use this to access features you have not granted them.
-
set preferred apps
set preferred apps
-
Allows the app to modify your preferred apps. Malicious apps may silently change the apps that are run, spoofing your existing apps to collect private data from you.
Allows the app to modify your preferred apps. Malicious apps may silently change the apps that are run, spoofing your existing apps to collect private data from you.
-
modify system settings
modify system settings
-
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
-
modify secure system settings
modify secure system settings
-
Allows the app to modify the system's secure settings data. Not for use by normal apps.
Allows the app to modify the system's secure settings data. Not for use by normal apps.
-
modify the Google services map
modify the Google services map
-
Allows the app to modify the Google services map. Not for use by normal apps.
Allows the app to modify the Google services map. Not for use by normal apps.
-
run at startup
run at startup
-
Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the app to slow down the overall phone by always running.
Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the app to slow down the overall phone by always running.
-
send sticky broadcast
send sticky broadcast
-
Allows the app to send sticky broadcasts, which remain after the broadcast ends. Excessive use may make the phone slow or unstable by causing it to use too much memory.
Allows the app to send sticky broadcasts, which remain after the broadcast ends. Excessive use may make the phone slow or unstable by causing it to use too much memory.
-
read your contacts
read your contacts
-
Allows the app to read data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.
Allows the app to read data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.
-
modify your contacts
modify your contacts
-
Allows the app to modify the data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific contacts. This permission allows apps to delete contact data.
Allows the app to modify the data about your contacts stored on your phone, including the frequency with which you've called, emailed, or communicated in other ways with specific contacts. This permission allows apps to delete contact data.
-
read call log
read call log