Stay tuned! Some app permissions are dangerous for your device

For a certain application to work correctly, it is necessary to allow it to interact with several other functionalities of the mobile device. If the desired application is a photo editor, for example, granting access to cameras and photo folders may make sense. However, other permissions, such as microphones that do not have an explicit meaning, can generate distrust.

Want to know how to protect yourself from these undue permissions? Follow the text and learn more!

see more

Mystery: Discovering the function of balls in high voltage wires

Employee prohibits children from sleeping when they arrive at daycare

See more at: App Permissions You Should Think Before Accepting

What are Permissions?

Every time we download an application, certain permissions are requested for the execution of its functionalities. A messaging application, for example, requires the release of the camera, microphone and even location, in certain cases.

One of the novelties of the latest Android, Marshmallow, is being able to modify these permissions after downloading the application. So, if any permission is bothering you, just go to the settings and deprive the application of access to that function. If this deprivation impairs the functioning of the application, the system will issue a warning.

It is important to pay close attention to applications, as once they are downloaded they have full access to the user's internet. This can be dangerous, as many files can be downloaded without prior knowledge.

dangerous permissions

Granting some permissions is important for the app to be able to perform its functions well. However, it's important to ask yourself which ones really make sense for a given app.

Thus, permissions such as motion sensor and GPS can trigger an alert. Some experts even found that these permissions gave some apps the freedom to “listen” to voice interactions.

Allowing SMS and contact access can also be dangerous, as authorizing the application to access such information, malicious individuals can use it to send messages to their contacts.

Therefore, it is important to be alert for all these situations. The solution is to observe each permission and if it has a meaning in the execution of the application.

Easter Day. Easter celebration day

the day of celebration of Easteris the main day of the Christian liturgical calendar, as it is on...

read more

Nominal Complement. Identifying the Nominal Complement

nominal complement it is the term of the sentence that is linked to a name by means of a preposit...

read more
What is privatization?

What is privatization?

Privatization it is the practice in which a company or public institution is sold to the private ...

read more