Allows an application to access coarse (e.g., Cell-ID, WiFi) location.
Allows an application to access fine (e.g., GPS) location.
Allows an application to access extra location provider commands.
Allows applications to access information about networks
Allows applications to access information about Wi-Fi networks.
Allows access to the list of accounts in the Accounts Service .
Allows applications to open network sockets.
Allows an application to modify global audio settings.
Allows an application to monitor, modify, or abort outgoing calls.
Allows an application to read the user's contacts data.
Allows an application to read the low-level system log files. Log entries can contain the user's private information, which is why this permission is 'dangerous'.
Allows read only access to phone state.
Allows an application to read SMS messages.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user.
Allows an application to monitor incoming SMS messages, to record or perform processing on them.
Allows an application to record audio.
Allows an application to use SIP service.
Allows access to the vibrator.
Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
Allows an application to write to external storage.
Allows an application to read or write the system settings.