Whoscall is the best app for identifying and blocking calls
With Whoscall, you can instantly identify the source of calls and text messages even if the caller's number is not in your contact list. Whoscall also helps you block specific ...Read more
Whoscall is the best app for identifying and blocking calls
With Whoscall, you can instantly identify the source of calls and text messages even if the caller's number is not in your contact list. Whoscall also helps you block specific numbers.
Our global database provides more than 600 million numbers. Using Whoscall, more than 20 million calls are filtered and about 500,000 malicious calls are blocked by users everyday. Start protecting your phone communication now!
★ One of the Best Apps of 2013 on Google Play in 8 countries ★
★ "Helps Users Avoid Spam Calls" -TechCrunch ★
Features: • Instant caller ID identification Identify background information of incoming unknown calls in a blink through tags reported by other users, internet search results, and our comprehensive global database. Say Hello to Strangers! • Block unwanted calls and SMSs forever Block calls and SMSs intelligently to ensure a harassment-free calling experience, never say Hello to spammers! • Database with over 700 million phone numbers Search global database of 700,000,000 phone numbers. • Report Numbers Report name for unknown numbers to create a reliable communication network for everyone. • Offline Database (Lightning identification) - Fast phone number search and offline accessibility (This function only works for numbers in the database)
• Personalized ShowCard Get ready to call with style, with the new ShowCard you have many personalized settings to choose from.
**The offline databases are available only in the following countries (Taiwan, Japan, Hong Kong, Korea and USA, Brazil, Malaysia etc.)
System requirements: • Android v2.3 or higher versions • Stable Internet access required for real-time lookup. • Use of 3rd party SMS apps might cause blocking failure. • Use of battery conservation apps may cause performance issues. • Starting from Android 4.4, Google has revoked SMS/MMS permissions from developers. Due to that fact, Whoscall will not be able to block SMS/MMS for Android versions 4.4 and above. Call blocking feature is not affected. • Due to system limitations of dual sim card phones, Whoscall have to be customized for each device. If your device is not in the following list, Whoscall may have some difficulties operating on that phone. We are sorry for the inconvenience.
HTC one Dual 802d (Android 4.2.2) Samsung Galaxy Y GT-S6102 (Android 2.3.6) Samsung Galaxy win i8552 (Android 4.1.2) Samsung Grand Duos GT-I9082 (Android 4.1.2) RedMi 2013023 (Android 4.2.2) MTK-mini3 (Android 4.2.2)
Allows an application to use the account authenticator capabilities of the account manager, including creating accounts and getting and setting their passwords.
discover known accounts
Allows an application to get the list of accounts known by the phone.
read sync settings
Allows an application to read the sync settings, such as whether sync is enabled for contacts.
read sync statistics
Allows an application to read the sync stats; e.g., the history of syncs that have occurred.
write sync settings
Allows an application to modify the sync settings, such as whether sync is enabled for contacts.
display system-level alerts
Allows an application to show system alert windows. Malicious applications can take over the entire screen of the phone.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
control vibration alert
Allows the application to control the vibration alert.
change your audio settings
Allows application to modify global audio settings such as volume and routing.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
view Wi-Fi status
Allows an application to view the information about the state of Wi-Fi.
directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
modify/delete SD card contents
Allows an application to write to the SD card.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.