Allows an application to view the state of all networks.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
access extra location provider commands
Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.
Allows application to take pictures with the camera. This allows the application at any time to collect images the camera is seeing.
change your audio settings
Allows application to modify global audio settings such as volume and routing.
Allows application to access the audio record path.
Allows the application to control the vibrator.
discover known accounts
Allows an application to get the list of accounts known by the phone.
Your personal information
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.