Allows an application to view the state of all networks.
view Wi-Fi state
Allows an application to view the information about the state of Wi-Fi.
modify global system settings
Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
mount and unmount filesystems
Allows the application to mount and unmount filesystems for removable storage.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
allow Wi-Fi Multicast reception
Allows an application to receive packets not directly addressed to your device. This can be useful when discovering services offered nearby. It uses more power than the non-multicast mode.
modify/delete SD card contents
Allows an application to write to the SD card.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
manage the accounts list
Allows an application to perform operations like adding, and removing accounts and deleting their password.
act as the AccountManagerService
Allows an application to make calls to AccountAuthenticators
discover known accounts
Allows an application to get the list of accounts known by the phone.
act as an account authenticator
Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.