Stay connected anywhere, anytime with Naver Blog. With the official Naver Blog app, you can check out real-time status of your blog and the latest updates from your neighbors. Also, you can easily publish posts with photos or location ...Read more
Stay connected anywhere, anytime with Naver Blog.
With the official Naver Blog app, you can check out real-time status of your blog and the latest updates from your neighbors. Also, you can easily publish posts with photos or location information. Naver Blog is just the right way to share your stories with the world!
1)Check out real-time status updates of your blog and any updated post from your neighbors 2)View enlarged photos on posts. 3)Enjoy lively communication with your neighbors. You can directly access your neighbors, read their latest updates, and leave short messages on the board. 4)Upload posts with photos or maps. You can save them even when you are offline! 5)Add a new blogger as your neighbor and accept anybody who wants to become one of your neighbors.
Thank you for using Naver apps. We will continue to improve our products and to provide up-to-date services.
In case a problem or an error occurs while using the app, please feel free to leave your inquiry on NAVER Customer Center (WEB: m.help.naver.com/mail.nhn, MAIL: firstname.lastname@example.org) Please note that an accurate assessment and answer to your problem may not be possible if you do not provide us with a direct inquiry to the above Customer Center. Please understand that leaving us a feedback comment on the review board, while greatly appreciated, does not suffice as a direct inquiry.
Do you have a question about this app?
UPDATED ON: May 1, 2016
SIZE Varies with device
INSTALLATIONS: 10,000,000 - 50,000,000
LATEST VERSION: Varies with device
ANDROID VERSIONVaries with device
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
display system-level alerts
Allows an application to show system alert windows. Malicious applications can take over the entire screen of the phone.
read system log files
Allows an application to read from the systemʼs various log files. This allows it to discover general information about what you are doing with the phone, but should not contain any personal or private information.
control vibration alert
Allows the application to control the vibration alert.
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
discover known accounts
Allows an application to get the list of accounts known by the phone.
use account authentication credentials
Allows an application to request authentication tokens.
manage the accounts list
Allows an application to perform operations like adding, and removing accounts and deleting their password.
act as an account authenticator
Allows an application to use the account authenticator capabilities of the account manager, including creating accounts and getting and setting their passwords.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.