wmsha/streing
-
read sensitive log data
read sensitive log data
-
Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
-
use any media decoder for playback
use any media decoder for playback
-
Allows the app to use any installed media decoder to decode for playback.
Allows the app to use any installed media decoder to decode for playback.
-
manage trusted credentials
manage trusted credentials
-
Allows the app to install and uninstall CA certificates as trusted credentials.
Allows the app to install and uninstall CA certificates as trusted credentials.
-
run the application's scheduled background work
run the application's scheduled background work
-
This permission allows the Android system to run the application in the background when requested.
This permission allows the Android system to run the application in the background when requested.
-
read/write to resources owned by diag
read/write to resources owned by diag
-
Allows the app to read and write to any resource owned by the diag group; for example, files in /dev. This could potentially affect system stability and security. This should be ONLY be used for hardware-specific diagnostics by the manufacturer or operator.
Allows the app to read and write to any resource owned by the diag group; for example, files in /dev. This could potentially affect system stability and security. This should be ONLY be used for hardware-specific diagnostics by the manufacturer or operator.
-
enable or disable app components
enable or disable app components
-
Allows the app to change whether a component of another app is enabled or not. Malicious apps may use this to disable important phone capabilities. Care must be used with this permission, as it is possible to get app components into an unusable, inconsistent, or unstable state.
Allows the app to change whether a component of another app is enabled or not. Malicious apps may use this to disable important phone capabilities. Care must be used with this permission, as it is possible to get app components into an unusable, inconsistent, or unstable state.
-
grant or revoke permissions
grant or revoke permissions
-
Allows an application to grant or revoke specific permissions for it or other applications. Malicious applications may use this to access features you have not granted them.
Allows an application to grant or revoke specific permissions for it or other applications. Malicious applications may use this to access features you have not granted them.
-
set preferred apps
set preferred apps
-
Allows the app to modify your preferred apps. Malicious apps may silently change the apps that are run, spoofing your existing apps to collect private data from you.
Allows the app to modify your preferred apps. Malicious apps may silently change the apps that are run, spoofing your existing apps to collect private data from you.
-
modify system settings
modify system settings
-
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
-
modify secure system settings
modify secure system settings
-
Allows the app to modify the system's secure settings data. Not for use by normal apps.
Allows the app to modify the system's secure settings data. Not for use by normal apps.