Home Blog Archive Android Android permissions and their meaning

Android permissions and their meaning

  • Oct 26, 2025
  • 894
  • 0

The permissions of Android Apps are sometimes of great importance, yet little attention. To them, you can usually recognize whether an App is legitimate or whether it should act as a stealth spy software on your Smartphone. Finally, Apps can access with appropriate permissions on large parts of their data. In this tips we will show you how you can protect yourself from attacks and what is the meaning of the individual rights.

Where can I check the permissions of an App?

  • This is quite simple: If you install an Android App - whether directly on the device or from the PC - get the list of permissions is displayed. It is only when you have confirmed this with "Accept", the application will be installed.
  • In the Browser Version of the Play Store it is call especially convenient permissions. Click here just to the right of "Overview", "reviews" and "New features" on the tab "permissions".
  • Alternatively, you can also use the free App "APEFS" which is about the rights of the currently installed Apps informed.
Android Permissions

Critical and safe permissions

In order to distinguish between critical and harmless permissions, has Google you the App Download structured according to specific criteria: Potentially harmful permissions that appear at the top of the list, all others only after a click on "show All" (see Screenshot above). In total, there are around 160 permissions demanded by an Android App. The largest part, however, is straightforward and represents no danger for your data.
In the Following you see a selection of the most important and common permissions for Android, along with a brief description and evaluation.

Well-known search accounts

The App can see what accounts your Smartphone is already connected. This is useful if want to connect the App with Facebook.

Pictures and Videos

The application always has full access to your cameras in the mobile phone. If the App has nothing to do with pictures is to see this permission with a critical eye.

Full Internet Access

In conjunction with other notifications this is dangerous, because the App can upload to out peered the data uncontrolled to the Internet. Especially in the case of dubious-looking Apps, you have to be careful.

Control vibration alarm

The permission just causes the App to access the Vibartions engine in the Smartphone to vibrate in notifications. A data Theft is to be feared all the more difficult.

Precise (GPS) location

This permission allows the App to determine your current location very exactly. For example, in the case of card services, is indispensable, but to see many of the other Apps is quite critical.

View network connections

The App can only 3G ask what network you are on, for example, or Wi-Fi. Is used this, for example, in order for an App larger Download content downloads only over wifi and not over mobile data connection.

Disable hibernation

This is used, for example, Video players, so that the Display remains on during playback to switch off. The permission can maximum lead to increased battery consumption, and is thus harmless.

Calendar events plus confidential information, read.

This permission gives the App access to your entire calendar data, and should therefore be tested very carefully.

Install Packages (install Apps)

The App can install other Apps. The permission should be only in the case of Market applications, such as the "Amazon App Store" presence.

Read sensitive log data

This permission is only to be treated with caution - especially in the case of Apps from third party developers. The log data may contain sensitive information and should only be used for detailed error reports.

Directly call phone numbers

This brings with it the danger that Apps that call paid numbers and thus greater financial damage. In the case of Apps, with Phone to do, such as "Skype" is the right, but rather harmless.

Contents of your USB storage modify or delete

This permission is needed by many Apps, data such as game saves on the memory outsource. At the same time, you also have access to private data stored in the memory. In the case of dubious-looking Apps, you should be very careful.

Read phone status and identify

This access is not entirely unproblematic, since the IMEI and IMSI number of the mobile phone can be queried. The permission is still required by many Apps, so you can pause on incoming Calls automatically.

Background processes to finish

The task Manager need to have this right, for example, so that you can function at all. It can lead in the worst case, loss of data, but not to the data Theft.

Record Audio

It is sometimes used by applications when they respond to acoustic signals, such as in the case of a voting device. Otherwise, the authorization should not be found, even if the available data is likely to yield unlikely to be recovered.

Short messages send

This permission can be used, for example, by an App closes by SMS an expensive subscription without you realizing it. It is therefore with caution.

Conclusion

Take you seriously the permissions and check prior to Installation whether they are really needed by the App. Are you looking for more information about the App or the permissions that make you wonder, and you waive, in case of doubt, prefer to on the Download. Just of dubious-looking Apps, you should let the Finger - for example, in the case of a bad description and more negative reviews translate. Detailed reviews of many Android and iOS Apps you can find in our "App-area".

YOU MAY ALSO LIKE

0 COMMENTS

LEAVE A COMMENT

Human?
1 + 3 =