Allows an application to read the sync stats e.g., the history of syncs that have occurred.Allows an application to read the sync settings, such as whether sync is enabled for Contacts. Allows an application to view the state of all networks.Allows an application to view the information about the state of Wi-Fi.Allows the application to control the vibrator.Allows an application to get the list of accounts known by the device.Malicious applications can corrupt your system's configuration. Allows an application to modify the system's settings data.Allows an application to modify the sync settings, such as whether sync is enabled for Contacts.May allow malicious applications to discover private information about other applications. Allows application to retrieve information about currently and recently running tasks.Allows an application to prevent the device from going to sleep.A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished. Allows an application to disable the keylock and any associated password security.Allows an application to write to the SD card. Allows an application to write to the USB storage.modify/delete USB storage contents modify/delete SD card contents.An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like. Allows the application to access the phone features of the device.Malicious applications can use this to erase or modify your contact data. Allows an application to modify the contact (address) data stored on your device.Malicious applications can use this to send your data to other people. Allows an application to read all of the contact (address) data stored on your device.Allows an application to create network sockets.Malicious applications can use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate device location, where available.Allows application to access the audio record path.Allows application to modify global audio settings such as volume and routing.Allows an application to request authentication tokens.use the authentication credentials of an account.Allows an application to perform operations like adding, and removing accounts and deleting their password.Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.Is there any page where Skype (the company) justifies the various permissions?ĭoes it make any difference, whether I'm a paying customer or not? I'd like to know what Skype does with all the permissions it asks for.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |