VT_TraceMyKid application is used to trace the kid, get stats and call log for the phone. It helps in location the child with one message. This application responds with defined actions according to message received and action associated with it.
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
modify/delete SD card contents
Allows an application to write to the SD card.
Your personal information
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
view network state
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
mock location sources for testing
Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
send package removed broadcast
Allows an application to broadcast a notification that an application package has been removed. Malicious applications may use this to kill any other running application.