Wall posts search Send stickers in wall comments Upload video to message Games list New stickers added
The application has access to the following:
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
modify/delete SD card contents
Allows an application to write to the SD card.
Allows the application to control the vibrator.
Allows application to access the audio record path.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
read system log files
Allows an application to read from the systemʼs various log files. This allows it to discover general information about what you are doing with the phone, but should not contain any personal or private information.
read sync settings
Allows an application to read the sync settings, such as whether sync is enabled for contacts.
write sync settings
Allows an application to modify the sync settings, such as whether sync is enabled for contacts.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
Your personal information
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
act as an account authenticator
Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.
manage the accounts list
Allows an application to perform operations like adding, and removing accounts and deleting their password.
discover known accounts
Allows an application to get the list of accounts known by the phone.