For a certain application to work correctly, it is necessary to allow it to interact with several other functionalities of the mobile device. If the desired application is a photo editor, for example, granting access to cameras and photo folders may make sense. However, other permissions, such as microphones that do not have an explicit meaning, can generate distrust.
Want to know how to protect yourself from these undue permissions? Follow the text and learn more!
see more
Mystery: Discovering the function of balls in high voltage wires
Employee prohibits children from sleeping when they arrive at daycare
See more at: App Permissions You Should Think Before Accepting
What are Permissions?
Every time we download an application, certain permissions are requested for the execution of its functionalities. A messaging application, for example, requires the release of the camera, microphone and even location, in certain cases.
One of the novelties of the latest Android, Marshmallow, is being able to modify these permissions after downloading the application. So, if any permission is bothering you, just go to the settings and deprive the application of access to that function. If this deprivation impairs the functioning of the application, the system will issue a warning.
It is important to pay close attention to applications, as once they are downloaded they have full access to the user's internet. This can be dangerous, as many files can be downloaded without prior knowledge.
dangerous permissions
Granting some permissions is important for the app to be able to perform its functions well. However, it's important to ask yourself which ones really make sense for a given app.
Thus, permissions such as motion sensor and GPS can trigger an alert. Some experts even found that these permissions gave some apps the freedom to “listen” to voice interactions.
Allowing SMS and contact access can also be dangerous, as authorizing the application to access such information, malicious individuals can use it to send messages to their contacts.
Therefore, it is important to be alert for all these situations. The solution is to observe each permission and if it has a meaning in the execution of the application.