Allows an application to view the state of all networks.
Allows the application to set the system wallpaper.
modify global system settings
Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
mount and unmount filesystems
Allows the application to mount and unmount filesystems for removable storage.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
modify/delete SD card contents
Allows an application to write to the SD card.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.