Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
access extra location provider commands
Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.
mock location sources for testing
Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers.
Allows application to take pictures with the camera. This allows the application at any time to collect images the camera is seeing.
change your UI settings
Allows an application to change the current configuration, such as the locale or overall font size.
change Wi-Fi state
Allows an application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
modify global system settings
Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
full Internet access
Allows an application to create network sockets.
Your personal information
read owner data
Allows an application read the phone owner data stored on your phone. Malicious applications can use this to read phone owner data.
write owner data
Allows an application to modify the phone owner data stored on your phone. Malicious applications can use this to erase or modify owner data.
discover known accounts
Allows an application to get the list of accounts known by the phone.