Remote Phone is the best way to manage your Android device from any browser directly from
# GENERAL # Remote Phone requires a Dropbox account, if you don't have one, register here ...Read more
A new way to interact with your smartphone has born! Call log, contacts, texts, device position, battery status... will be now available just for you on any computer or other portable device.
Sitting in front of your browser, you can text, change the ringing settings (*), send an alarm beep, start a phone call, set your wi-fi and bluetooth services (*), make your phone speaking (*)... use your smartphone even though far from your hands.
We use your Dropbox account for a recurrent back-up of all data in your phone; it will be available anytime, even with your smartphone off.
Don't panic anymore if you loose your smartphone: Remote Phone allows you to block your device with a PIN, as well as take a picture, start audio recording, locate and wipe it (*).
We are really concerned with your privacy. You only have your data! All data are transmitted over a SSL channel; all data are stored on your Dropbox account only.
# FAQ # Q: I got an error message while uninstalling the app: why? A: All apps requiring device administrator permission cannot be uninstalled. Please disable this option in the menu before uninstalling RemotePhone.
Q: I purchased the full version, but I do not receive events from Remote Phone. A: Open the app and select "Restore purchase". If the payment was correctly processed, this option will not be clickable anymore.
Q: I signed up for my Dropbox account through the link in homepage: how do I get the extra 500MB of space? A: The extra space will be recognized when you complete the activation of your account by installing the Dropbox application on your computer.
(*) Some operations require the payment of the full version.
Do you have a question about this app?
UPDATED ON: Dec 16, 2013
INSTALLATIONS: 10,000 - 50,000
LATEST VERSION: 188.8.131.52
REQUIRED ANDROID VERSION: 2.2 and up
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
view network state
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
create Bluetooth connections
Allows an application to view configuration of the local Bluetooth phone, and to make and accept connections with paired devices.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
change Wi-Fi state
Allows an application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
Allows an application to configure the local Bluetooth phone, and to discover and pair with remote devices.
display system-level alerts
Allows an application to show system alert windows. Malicious applications can take over the entire screen of the phone.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
modify/delete SD card contents
Allows an application to write to the SD card.
discover known accounts
Allows an application to get the list of accounts known by the phone.
use account authentication credentials
Allows an application to request authentication tokens.
directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
control vibration alert
Allows the application to control the vibration alert.
change your audio settings
Allows application to modify global audio settings such as volume and routing.
Allows application to take pictures with the camera. This allows the application at any time to collect images the camera is seeing.
Allows application to access the audio recording path.