Android App Permissions Dissected

Based on our recent research and feedback from our users, we know that Android permissions can sometimes be confusing. Often it is hard to tell what data apps are accessing on your phone and why they are accessing it. In this post we explain what permissions are and why developers ask for them. We want you to feel more knowledgeable about permissions so you can make good decisions when you download apps on your phone.

What are permissions? – In order to access certain data or capabilities on your phone, an app needs to request permission from you before you install it. When you download an app from the Android Market, you can see an outline of exactly what data and capabilities the app wants to access.

Some permissions allow access to standard phone capabilities such as the internet, while others involve accessing sensitive information such as your location or your text messages, so it’s important to pay attention to what permissions each app requests. When installing an app, Android flags particularly sensitive permissions in orange so that you pay closer attention to them. Other, less sensitive permissions are displayed in white. Continue reading …

Related Posts

CAPTCHAs With Chaos: Strong Protection for Weak Passwords The passwords of the future could become more secure and, at the same time, simpler to use. Researchers at the Max Planck Institute for the Physics...
E-Book Buyer’s Guide to E-Book Privacy With the 2010 holidays upon us, it's time to update EFF's E-Book Buyer's Guide to E-Book Privacy, which summarizes and comments on the privacy-relat...
Ubuntu TV: Can it gain a foothold in the market place? Canonical, the company behind Ubuntu, the popular Linux distribution for desktops and servers, just announced Ubuntu TV, a version of the distribution...
Be Confident Storing Information in the Cloud Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is...
File-Sharers Await Official Recognition of New Religion A group of self-confessed radical pirates are pinning their hopes on gaining official recognition of their own unique belief system. The founders of t...
Controlling a Computer With Thoughts? Researchers at the University of Pittsburgh have been awarded funding for two projects that will place brain-computer interfaces (BCI) in patients wit...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*