Joke Collection Website - Blessing messages - Games or e-books downloaded from the mobile phone market always give a hint. Is there an extra charge for accessing the phone status?

Games or e-books downloaded from the mobile phone market always give a hint. Is there an extra charge for accessing the phone status?

1. Your personal information

Danger index: ★★★★★★★

This is a privilege that sounds very important. Usually need to use system optimization, maps, input methods, browsers, data synchronization management and other applications. It can directly call the contact information in the mobile phone and your calendar activities without permission, even the history of the browser and bookmark collection will not be let go, and it can also send emails automatically. Because most applications don't need this permission, so think about it more. It would be very unreasonable if such a small game as "pushing boxes" still needs such high authority.

2. Services that require your payment

Danger index: ★★★★★★★

It is also an authority with a risk index of five stars. It can make phone calls and send text messages in the background without your knowledge. It is really convenient for applications such as "mobile online business hall" and "stock trader", which can simplify complex operations, but it is a good opportunity for rogue applications to show their talents. To know that SMS subscription service is everywhere, you can deduct a few dollars every month by sending a short message casually. It doesn't sound like much, but it's not a small amount in a year. If you dial it automatically, you will be killed for applications that need this permission, such as theme packs and ringtones.

3. Your information

Danger index: ★★★★★★★

"Now the technology, there is no need to bug. Now everyone's mobile phones are bugs. " In the previously popular Hong Kong film "Eavesdropping Storm", Daniel Wu's words were impressive. The mobile phone, which was originally designed to provide convenience for people's lives, may become a "bomb" that is always carried around if it is not carefully used, and become an auxiliary tool for some people to steal privacy. In the permissions of Android application, "Your Information" specifically controls the sending and receiving of SMS and MMS. Usually you only need to use titanium backup, Android system optimization, GO SMS and other applications. If there really is a game that needs this permission to run, it must be doing shady things in private.

4. Your position

Danger index: ★★★★★

This authority is very simple to explain, and the location of the mobile phone can be obtained through GPS positioning chip or base station positioning. Perhaps some users don't understand the use of other applications to collect geographic data besides map applications. Many life applications can push practical information based on geographical location. For example, public comments can tell you which foods, gas stations and convenience stores are around, and some advertisements are also based on this to achieve accurate delivery. Of course, there are also some applications that want to get this permission for other purposes, such as spyware. With the network communication permission, you can send out the geographical location in real time and realize mobile phone tracking. It is suggested that it is best to turn off the location service at ordinary times, which is both safe and energy-saving.

5. Hardware control

Danger index: ★★★★★

The hardware control authority is much easier to understand. For example, Gif Aauto Quicker needs camera cooperation, game Pride Eagle needs strong feedback, vibrator is needed, and rice chat needs microphone cooperation. It sounds safe, but it's relative. Some apps will quietly start the camera in the background. If something should not be filmed, it will be transmitted to the server. You know, another porn incident.

6. System tools

Danger index: ★★★★★

The authority of system tools is more complicated than expected, but fortunately, you can understand the meaning with a little imagination, such as managing Bluetooth, preventing mobile phones from sleeping, changing user interface and so on. Its danger lies in controlling the mobile phone, especially formatting the external storage device and unloading the file system. If you see these two tips when installing an application, you must be careful, because other applications are rarely used except for system optimization applications such as 360 security guards.

7. Network communication

Risk index: ★★★★

Most applications in the electronic market will apply for a network communication license, which allows applications to download data from the network during operation. For some non-interactive applications, such as independent games Chess and Gold Miner, this permission is usually needed to update or download advertising content for display. However, if you find that these applications are memory resident, or even start automatically, and secretly consume traffic, you should pay attention. It is likely to brush malicious traffic or build an Android botnet.

8. Your account

Risk index: ★★★★

"Your account authority" is rarely used by applications. Although it has the ability to verify the identity of users and manage account lists, its application scope is limited to various programs of Google Department, such as Google Maps and electronic market. The account information of most applications is not within its jurisdiction, so not many people are interested, so it is a relatively safe right.

9. storage; stock

Risk index: ★★★★

With the storage permission, you can modify and delete the data in the SD card at will. At present, more than 95% of Android applications need to obtain it for normal use, such as file management, photo storage, cache reading and writing, record archiving and so on. Some Trojan viruses use this privilege to destroy the data in the SD card. It's hard to stop the tragedy. Only by downloading applications in the formal electronic market can we nip in the bud.

10. Mobile phone call

Risk index: ★★★★

Talking on a mobile phone is the most difficult right to understand. Some applications need to know the current status of the mobile phone. If a call comes in, they will return the audio control to the operating system and reactivate it after the call. The most typical application is kailide navigation. With this permission, you can also get the IMEI identification code of the mobile phone, even the mobile phone number. Developers sometimes use this information to record users' usage habits, such as their preferences for certain online services or the frequency of using applications. Taking a music application as an example, developers will use IMEI to track which music content users like on their own servers, so as to optimize databases and pages and improve viscosity.

Copy and paste, above!