Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
full Internet access
Allows an application to create network sockets.
modify/delete SD card contents
Allows an application to write to the SD card.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.