To run the application, certain smartphone permissions are required. Android application permissions and how to manage them

Application permissions are a specific set of rules that the system will allow an application to carry out: At the time of launching or performing a certain action, the application may ask you for permission, for example, to access contacts, camera, your location and other device functions. Before the first launch, application rights are limited from access to the main functions and sections of the Android system, but they may be required for proper functioning.

Dangerous permissions worth keeping an eye on

This group includes those permissions that allow you to access the user’s personal information.
  1. Calendar– viewing events, changing current events already added to the calendar and creating new ones. Such permission can be dangerous for those who often use a calendar and plan their actions, scheduling literally every minute of time. If attackers gain access to your location, you know how it could end.
  2. Contacts– reading, viewing, editing, adding new contacts and full access to the list of accounts. Surely many of us have received annoying spam from one company or another via SMS or instant messengers. Access to contacts should only be given to trusted applications, otherwise your number may end up in the wrong hands. Unfortunately, there are too many scammers, and it’s impossible to completely get rid of spam.
  3. Camera– use without prior confirmation of the user. Once granted permission to your device's camera, the app can take photos and videos at any time without notifying you.
  4. Microphone- sound recording. Full recording of telephone conversations, constant microphone activity, recording everything that happens around without notifying the user.
  5. SMS– reading, sending, editing, forwarding messages. Surely, one of the most dangerous permissions, which can send a message to any number without your knowledge and thereby activate a paid subscription.
  6. Memory– reading/writing from and to memory. This permission allows the app to view files on your device, delete them, copy them, overwrite them, and more.

How to set application permissions

As you already understood from the list above, not all permissions are equally useful; many can harm the user. Naturally, there are quite the usual permissions, for example, accessing the Internet, connecting to Bluetooth, creating shortcuts and much more. They are performed automatically and do not require any action from the user. Below are a series of instructions that will allow you to configure permissions on different versions of the Android operating system.

Android 4.3

To manage permissions on this version of the OS, you will need AppOps software.
  1. Download, install and launch the application.
  2. Go to the applications tab (apps), find the desired program or game and click on it.
  3. Check/uncheck the permissions you need.

Android 5.0

For smartphones and tablets running the operating version of Android 5.0, to manage permissions, you need to use the App Ops - Permission manager program. The program allows you to manage permissions of both system applications (ROOT rights are required) and third-party applications installed by the user while using the device. Without ROOT rights on Android 5.0-5.1, this program, unfortunately, does not work, even in normal mode.

Android 6, 7, 8

In new versions of Android, application permissions are displayed exactly at the moment when the game/program needs it. You can study what exactly you need access to and then make the right decision.

In addition, the list of installed permissions for a specific application can always be changed and configured in a special item in the settings menu.

An attempt to save new information on a micro CD will fail if it is write-protected. There may be different reasons for the access denied message to appear. You can remove protection from microSD using several methods - software and physical. Let's look at the most relevant ones.

Unlocking microSD

Place the memory card on a flat surface or in the palm of your hand with the label facing up. On the top left side of the card body, find the small lock switch lever - the Lock button. “Locker” serves to protect information from accidental erasure. The lever can be flat and only slightly protrude from the body, and be white or silver in color. There is no such switch directly on microSD. Insert the card into the adapter and locate the Lock switch on the adapter itself. Move it all the way in the opposite direction.

After moving the Lock lever to the position of canceling the data protection status, the reappearance of the write error notification window may be caused by moving the Lock back to the protection position. This happens due to the weakening of the switch; when you insert a memory card into the card reader, it moves and turns on the memory lock. Secure it with a piece of rubber band, cardboard, or remove it completely.

You can avoid automatic blocking of recording on microSD by removing its contact with the Lock button on the adapter body. Find a small recess on the left side of the micro-flash drive, solder it with plastic or seal it with tape. Soldering must be done very carefully. The option with tape is simpler, but it can get stuck when inserting the card into the adapter.

Changing disk properties

If the memory card protection does not allow you to copy information to another drive, but you need to save it, then try removing the protection as follows. Connect the micro CD to your computer, find its name in the list of devices and right-click on it. From the menu, select the “Properties” line, then the “Access” tab. In the next window there is “Advanced settings”, open it and check the box “Share”, confirm the settings - “Ok”.

Formatting a microSD memory card

Sometimes, to remove protection from a memory card, it is recommended to format it if the “locker” is missing or did not help. Save important information to another disk, because... it will be completely deleted. You can programmatically remove the write lock on the card using Windows.

Install a microSD memory card on a personal computer via a special adapter directly or through a card reader. Modern laptops already have such a connector; it is usually marked with a “card” icon and looks like a narrow slot. The operating system will recognize the drive and its name will appear in the list of devices on your computer.

Right-click on the CD disk icon and select “Format ...” from the expanded menu. Set the file system to the one that your device supports, usually NTFS. Click "Get Started." All information on the disk has now been deleted and the protection status has been removed.


Changing the file system

When writing a file larger than 4 GB to a memory card, an error notification window may appear due to file system limitations. If the memory card is formatted with FAT32, the file size is one of its limitations for recording data. You should change the file system to NTFS, as described in paragraph 3.


Software tools for microSD

You can reset the write protection on a disk using software without deleting the information. There are various scripts and utilities for this, for example reset.zip. When downloading software from the Internet, you should be careful - it may contain viruses. It is better to use proven applications to remove protection. Low-level formatting of a disk with the Hard Disk Low Level Format Tool erases all data, but will help restore even hopeless flash drives that were not formatted using Windows internal means.

Removing microSD protection via a mobile device

Modern mobile devices: players, PDAs, phones, cameras have a microSD formatting function. Try to find this option through the settings and format the flash drive directly on this device. Memory protection could be software installed in the device to ensure data confidentiality. You can also remove protection in the settings. All types of electronic devices have their own characteristics, so if you have any difficulties, read the gadget’s instructions or get an explanation from a specialist at the service center.

Use only the “native” adapter with a microSD card. With another adapter, even if you were able to format the phone, you most likely won’t be able to write the information to disk.

Permission Master is a special module for the Xposed Framework, which is designed to manage the permissions of any program installed on your gadget. I made a detailed description of this project with step-by-step instructions for installing Xposed and individual modules for it in, so we won’t repeat it again, but let’s move directly to the work of Permission Master.

After installing the module and restarting the device, you will find a new icon in the application list in the form of a green shield with a gear. We launch the program and see a window divided into two tabs. The first contains the names of all available permits. Tapping on any name in the list shows us all programs that have this property. Another tap, and the program name becomes red and crossed out - this means that the corresponding permission has been disabled.

Approximately the same algorithm is used on the second tab, but here all permissions are grouped by program. You can view the list of available actions for each application and disable unnecessary ones with one tap. Please note that if you hold your finger over the name of any resolution, a pop-up window will appear explaining its properties. This will be very useful for those who doubt the necessity and safety of a particular action. And to protect yourself from additional problems, do not forget to go to the Permission Master settings and disable the display of system programs.

The Permission Master application will be useful for all advanced Android users who want to have full control over installed applications. Now you will have the opportunity to disable tracking functions, close those programs that do not need it at all, ban your smartphone and much, much more that is not available to ordinary Android users.

Sometimes a user needs to consider whether a particular application should be given a particular permission.

As you know, in order for an Android program to function normally, it needs to obtain the appropriate permissions. Some applications require read access to the file system, others also need write access, others want to know information about the user’s location, others want to transfer data via Wi-Fi in any volume... This article will look at those permissions that should only be granted to an application only if you are 100% sure of it.

Sleep time management

Any smartphone and tablet goes into “sleep” after a certain time. This allows the processor to turn off half of its cores, thereby beginning to save energy. Most applications are unable to wake up the device and their work is suspended. Unless the program has received permission to work even during “sleep”.

Such permission can be granted to an email client or instant messenger. Social media clients should also receive it. However, such permission should not be given to everyone.

If a malicious program receives it, it will be able to conduct any calculations even in the background. For example, in supposedly sleep mode, the smartphone will send spam mailings or even mine cryptocurrency because of this application. In some cases, this will cause the device to heat up. And almost always, such actions of a malicious program reduce battery life.

Location based on GPS data

Nowadays, almost all Android smartphones are equipped with a GPS chip. Its readings affect what kind of advertising is displayed in the browser and other applications. Also, geographic coordinates are needed in search results, where the stores closest to the user will be displayed first, and then all the others. Of course, permission to receive GPS data will have to be granted to navigation programs containing a map. But why does Flashlight, downloaded from Google Play, require such permission?

As you may have already understood, you should not grant location permission to absolutely all applications. Small utilities can do without it. Even online store clients can work just fine without this permission - you'll just have to enter your city name yourself.

It should be remembered that each access to GPS chip readings consumes a certain amount of energy. Therefore, it will be better if only some programs can make such requests.

Location based on GSM module data

The Android operating system can determine location not only using a GPS chip. Approximate information can be obtained from cell towers. Of course, this will only allow you to find out your area or block. But even this may be enough for malicious applications. Be sure to watch what programs you grant permission to determine your location via GSM communication!

Access to system autostart

Do not grant such permission under any circumstances unless you are 100% sure of the application developers! Typically, access to Android autorun is requested by all sorts of optimizers trying to increase battery life.

The problem is that when such permission is granted, the application may make some changes to the operating system configuration files. For example, you can easily prevent an antivirus from running. Or order the system to run some malicious code at startup.

Permission to access OS autostart should only be granted to time-tested tweakers. For example, those discussed in our selection.

Full Internet access

Nowadays, many applications require unlimited access to the World Wide Web. One gets the impression that a modern smartphone will refuse to work at all outside the network coverage area. In reality, of course, it is quite possible that the appropriate permission may not be issued to everyone who asks for it.

Messengers and social network clients must be able to receive messages at absolutely any time. But if a request for constant access to the Internet is issued by some calculator, then you need to think ten times. It is possible that this is some kind of malicious utility or virus. The program may request such permission in order to occasionally use the smartphone as a bot. It can also regularly transmit user location data to the network if it has received such permission. In short, it is necessary to provide access to the World Wide Web only to those applications that truly deserve it.

Vibration control

A completely harmless, at first glance, solution. However, attackers don't think so. They create apps that turn off vibration. Another program (or maybe the same one) intercepts messages arriving on a smartphone until they are read by a user who has not received the corresponding notification.

SD card access

Without access to a memory card, no file manager can function normally. It will also be needed by all kinds of players that read music and videos from the card. But do absolutely all applications need such access?

If the corresponding permission is required by some Notepad, then it is better not to provide it. Such programs may well store data in the built-in memory. It is possible that a virus is disguised as a useful application. Once authorized, it will use the SD card to store illegal or stolen data. Also, such an application can quietly send personal files to the developer - photos, documents and something like that.

If you store any sensitive data on your smartphone (for example, financial reports of your own company), then it is better not to give access to the SD card to unfamiliar programs. Moreover, such people are recommended to regularly backup the memory card and format it - at least once a quarter.

Communication status

Almost all malicious applications require this permission. The fact is that it is with its help that different communication modules are controlled, through which malicious code is then transmitted. As a result, the program can use the device as part of a botnet, used, for example, to send spam.

Control over the state of communication should be provided to the browser, instant messenger and social network clients. Then proceed with extreme caution - some applications may turn the connection on and off without your permission with malicious intent.

Accessing Application State

This permission is very useful for those programs that integrate advertising modules into the system. They operate very simply.

Only the most important utilities should have access to application state. These can be antiviruses and optimizers. And do not choose the creations of hitherto unknown developers for this role.

Wi-Fi connection control

This permission will have to be granted to all applications that operate via an Internet connection. However, under no circumstances should you provide it to any flashlights or note-taking programs (unless the latter are capable of synchronization).

If the application turns out to be malicious, it may start scanning your Wi-Fi network. It will recognize its settings and then transfer them to the developer server. It is possible that in the future this will lead to interception of communications, as well as the transmission and reception of malicious code. This is confirmed by the recent introduction of the KRACK virus, which affected a fairly large number of users.

Popular applications - all kinds of browsers and instant messengers - are not immune from the influence of hackers. Therefore, do not forget to update them so that all discovered security holes are quickly closed.

Access to smartphone status and identification

Some applications require full access to the smartphone identification. This means that from now on they will know its IMEI, configuration, phone number and other information. It is absolutely not necessary for every program to know all this. If this is some simple fishing guide, then it is better to reject the corresponding request. You should satisfy it if you installed a licensed game (for which you paid), a bank application, a Yandex.Money client, or some other similar program. Let the rest of the developers' creations recognize you by your login and password - they have no need to know IMEI.

What can malicious programs do if they gain access to device identification data? Their creators can use the information received to their advantage. For example, they can clone IMEI, start sending spam to your phone number, and perform other similar actions. Roughly speaking, this is how online finance crimes are most often committed.

Access to contacts and SMS messages

A variety of applications compete to read contacts from your phone book. First of all, these are instant messengers and social network clients.

If some malicious application gets permission to read contacts, then your friends and colleagues can expect all sorts of spam in the form of SMS. This is how databases of phone numbers are most often collected, which can now be freely purchased on Telegram.

In short, do not provide appropriate access to photo galleries and office applications. They don't need contacts. However, there are exceptions to the rule. For example, Samsung Health scans your contacts so that you can compete with other owners of this program. We also recommend that you clean your contact book from time to time. Leave in it only those people with whom communication is possible. You shouldn’t keep numbers in your phone book that you received from free classifieds services - it’s clear that you won’t call such a person again.

Summarizing

All app permissions are here

On older versions of the Android operating system, you had to immediately grant all the permissions that the application requested during installation. Fortunately, permission requests are now flowing more smoothly. If the program wants to go online for the first time, you will see a corresponding notification. In this regard, you can safely prohibit utilities from accessing certain functions of the operating system. Take advantage of it!

How do you feel about safety? Do you keep track of what permissions the apps you install ask for? Post your opinion in the comments.

Google has finally done it. Android 6.0 Marshmallow includes a new iOS style that adds permission management to Android apps. You can also manually revoke the permissions of any app - even those designed for older versions of Android.

You don't need root access, custom firmware, or upgrading to an iPhone to do this. This mobile operating system now comes with Android app permission management.

New Android app permission system

Android 6.0 apps will now ask for permission when they need it. For example, instead of giving permission to access the camera when you install an application, you will be asked to allow access to the camera the first time you launch the application.

You can manually manage app permissions, even if the apps were released for older versions of Android and they don't prompt for access when first launched.

Manage Android App Permissions

To do this, you will need Android 6.0 Marshmallow or a newer version on your device.

Open “Settings”, click on “Applications”, which is located in the “Device” section.

You will see a list of all applications installed on your Android device. Click on an application in the list to view more information. On the application information screen, you will see a “Permissions” option, which lists all the permissions that the application has access to. Click on "Permissions".

You can also quickly access app information by long-pressing an app icon and dragging it to the About app shortcut that appears at the top of the screen. This shortcut may not be available on some devices as manufacturers and carriers may use a different interface.

Let's get back to permissions. Various permissions will be displayed here, such as contacts, phone, SMS and others. Apps for older versions of Android will automatically receive all required permissions when installed, but you can turn off permissions if you wish.

If you disable any permission, a warning will appear stating that the app was designed for older versions of Android and disabling it may cause it to crash.

Older apps aren't designed for this feature, and they tend to just assume they have access to whatever features they need. In most cases, after disabling permissions, applications work stably. In some cases, disabling the permission may cause a crash, in which case simply enable the permission again. For example, if you disable camera permission for an app that is designed for photography, the app will no longer be able to take photos. You will not receive a message asking you to authorize the camera again. Therefore, Android permission management is a useful, but in some way dangerous feature.

In any case, if after disabling the permission the application does not work as it should, then you can always return to this menu and grant the permission again.

You can also go to the menu, which is located in the upper right corner of this screen, and click “All permissions”. Here you can see all the permissions that are granted to the application. Android hides some permissions. As you can see, managing Android app permissions does not apply to all categories.

Keep in mind that when updating, the application may receive permission without asking you about it. For example, if some application can use contact reading and you allow the use of “Phone”, then after updating the application may receive permission to make phone calls, which could subsequently cost you lost money. Since making a phone call is part of the Phone permission, there will be no additional requests for permission to make calls. You can review what each permission means on Google's website.

View and manage Android permissions for all apps

To view and manage permissions for all apps at once, open Settings and go to Apps. In the upper right corner, click on the gear icon and click on “Application Permissions”.

You'll see a list of permissions and the number of apps that have access to those permissions. Categories include SMS, Calendar, Camera, Contacts, Location, Microphone, Body Sensors, Memory, Phone and some additional permissions.

To view apps that use a permission category, click on it. For example, to see which apps have access to calendar data, tap Calendar. To prevent an app from accessing your calendar, turn it off on this screen.

When you disable permission, you will see a warning that the application was developed for older versions of Android.

As always, some steps and names may vary between devices. Manufacturers often change the interface of their devices, and some options may be available in other places.