Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
create Bluetooth connections
Allows an application to view configuration of the local Bluetooth phone, and to make and accept connections with paired devices.
modify/delete SD card contents
Allows an application to write to the SD card.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
mock location sources for testing
Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.
restart other applications
Allows an application to forcibly restart other applications.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
measure application storage space
Allows an application to retrieve code, data, and cache sizes
send sticky broadcast
Allows an application to send sticky broadcasts, which remain after the broadcast ends. Malicious applications can make the phone slow or unstable by causing it to use too much memory.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
display system-level alerts
Allows an application to show system alert windows. Malicious applications can take over the entire screen of the phone.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
Allows the application to control the vibrator.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.