Mobile phone into a privacy leak in the hardest hit area What are the APP call permissions used for?
Issue Time:2018-09-30
A while ago, the vivo NEX was called "Rogue Software Terminator" because the design of the pop-up camera allowed the software to clearly show up in front of us every time the camera was called. In fact, for mobile phone users, especially Android mobile phone users, they may not know what permissions the APP has. When we don't know, they may be recording or even recording. Today we will talk about the mobile app application permissions.

What permissions do APP have?

When we install the app, the phone usually reminds us to grant the app permission. The common one is the storage permission, the camera microphone is called, the phone ID is obtained, and so on. But the application permissions in the mobile phone are far more than these, and some application permissions may be the first time I see it. For example, the phone in my hand has already marked the permissions clearly.

In these permissions we see some familiar faces, such as phone, SMS, contacts, calendar and other permissions, which we can use when we use most of the software, they will also prompt us to authorize.

The two permissions in the privacy module are more attractive to me. One is to "get the browser online record". One of the two applications is a mobile phone clone (which should be used when the mobile phone transplants data), and the other is a search engine. I am not sure about what it takes to get my browsing history. Another one is "read the list of installed apps". The APP with this permission is the most. It should be that all apps on the phone can read the list of installed apps. I remembered that the most popular mobile game, "Jesus Survival and Stimulus Battlefield", announced the release of the user who used the handle as the simulator user, and the APP with the handle in the mobile phone would be used as the simulator. It should be used. Such permission.

Some APP permissions are inexplicable

There are a lot of these privilege categories on the phone, and some mobile apps will get some out of the permissions when we ignore them. Reading the location information allows us to get access to a lot of software on our mobile phone, such as the positioning function of social software, navigation software, take-away software, news client, etc. I can understand. However, some image processing software, e-book software, and some software that does not have social functions at all also need the right to locate. Is it necessary to choose the P map according to where I am from, or will there be different customary differences between people reading in different places?

The permissions that are often acquired by the software are the permissions of the camera and the microphone. We can understand that some social software requires video calls, some software has the function of scanning codes and so on. But we can also find some strange software to get the camera permissions. For example, when a travel website of the vivo NEX test is opened, the camera will be called, and then an input method has been used. Although they all have such reasons, we seem to have no privacy, and mobile phones can monitor us at any time.

The access to mobile apps is convenient for us on the one hand, and our privacy is leaked on the other hand. For example, we browsed the information about studying abroad on the website, and may have a call from the study agent. We just bought some diapers, and the sales of early childhood classes may be on the way. The disclosure of this information may be leaked when we accidentally fill out the information, and some mobile phone rogue software captures our private information.

There are also some software to play tricks, in order to let their applications not be cleaned up by the system, run on the upper layer of other software, apply for a floating window, but only 1 pixel, I may not see where there is a magnifying glass An APP is running, which not only consumes the performance resources of the mobile phone, but also gives the software a way to sneak up on things. In the face of these, how should we deal with it? Mobile phone rogue APP to obtain this permission, we may also leak our privacy, how should we deal with it?

First of all, from the source, try to download the software in the mobile phone's own official application store, or look for the official website of the corresponding software to download, the software in these places can be guaranteed not to be tampered with by third parties, relatively more secure.

Then there are some unknown software, known as cracked version of the game, or game assist, etc. Try not to touch, especially the seemingly good game assistive software, they may ask you to open a lot of permissions, and there are still messy Advertising, if you are not careful, you may be tricked.

The other is to see the permission to get permission on the phone when installing and using the software, to see if some features are necessary for this software. Some friends use the mobile phone to save time, the software application permission to agree, and some even directly choose the trust software to grant all permissions, these are not desirable.

In the process of using the mobile phone, the protection of privacy should also be put on the agenda. In addition to the above mentioned questions about mobile APP permissions, the usual habit of surfing the Internet also requires us to pay attention to, unfamiliar software should not be downloaded, do not understand the questionnaire information should not be easily filled in and so on. In the Internet age, everyone's privacy can be exploited, and we need to protect our privacy by paying attention to ourselves.

Article source: Network

HSEM    M5501

Branded mobile phone style, Leading the fashion trend.M5501is A cost-effective mobile phone


 HSEM    x9

High-definition camera, shooting more beautiful picture.


HSEM    T5998

MTK6750  1.5Ghz Processor, 5.99 inch  18;9 HD+ 1440*720,Glass battery cover

4GB+64GB,Micro SD card ( T-FLASH card), max 128GB

HSEM    I6




newsletter