A disturbing observation...
As a new tablet owner (Acer 500), I was taken back by a rundown of permissions for-of all things, an antivirus program (AVG Antivirus Free).
An update for itstates that it can access the camera on the tablet. Now why would an app need to be able to turn on the camera-and access the microphone, anytime someone wanted to? Goes without saying, but I don't want some Orwellian Big Brother surreptitiously watching me, knowing where I am, or what I'm doing.
Is there anyway to block what an app can do, or do you simply pass on installing it?
As a new tablet owner (Acer 500), I was taken back by a rundown of permissions for-of all things, an antivirus program (AVG Antivirus Free).
Yikes!Permissions
This application has access to the following:
- Your accountsmanage the accounts list
Allows the app to perform operations like adding and removing accounts, and deleting their password.- Your locationcoarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious apps may use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious apps may use this to determine approximately where you are.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the tablet, where available. Malicious apps may use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. Malicious apps may use this to determine where you are, and may consume additional battery power.- Your messagesedit SMS or MMS
Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages. Allows the app to write to SMS messages stored on your phone or SIM card. Malicious apps may delete your messages.
receive SMS
Allows the app to receive and process SMS messages. Malicious apps may monitor your messages or delete them without showing them to you.
read SMS or MMS
Allows the app to read SMS messages stored on your tablet or SIM card. Malicious apps may read your confidential messages. Allows the app to read SMS messages stored on your phone or SIM card. Malicious apps may read your confidential messages.- Network communicationfull Internet access
Allows the app to create network sockets.
create Bluetooth connections
Allows the app to view the configuration of the local Bluetooth tablet, and to make and accept connections with paired devices. Allows the app to view the configuration of the local Bluetooth phone, and to make and accept connections with paired devices.- Your personal informationread sensitive log data
Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
read contact data
Allows the app to read all of the contact (address) data stored on your tablet. Malicious apps may use this to send your data to other people. Allows the app to read all of the contact (address) data stored on your phone. Malicious apps may use this to send your data to other people.
write contact data
Allows the app to modify the contact (address) data stored on your tablet. Malicious apps may use this to erase or modify your contact data. Allows the app to modify the contact (address) data stored on your phone. Malicious apps may use this to erase or modify your contact data.
write Browser's history and bookmarks
Allows the app to modify the Browser's history or bookmarks stored on your tablet. Malicious apps may use this to erase or modify your Browser's data. Allows the app to modify the Browser's history or bookmarks stored on your phone. Malicious apps may use this to erase or modify your Browser's data.
add or modify calendar events and send email to guests without owners' knowledge
Allows the app to send event invitations as the calendar owner and add, remove, change events that you can modify on your device, including those of friends or co-workers. Malicious apps may send spam emails that appear to come from calendar owners, modify events without the owners' knowledge, or add fake events.
read Browser's history and bookmarks
Allows the app to read all the URLs that the Browser has visited, and all of the Browser's bookmarks.- Phone callsread phone state and identity
Allows the app to access the phone features of the device. An app with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.- Storagemodify/delete USB storage contents modify/delete SD card contents
Allows the app to write to the USB storage. Allows the app to write to the SD card.- System toolsformat external storage
Allows the app to format removable storage.
retrieve running apps
Allows the app to retrieve information about currently and recently running tasks. Malicious apps may discover private information about other apps.
delete all app cache data
Allows the app to free tablet storage by deleting files in app cache directory. Access is very restricted usually to system process. Allows the app to free phone storage by deleting files in app cache directory. Access is very restricted usually to system process.
mount and unmount filesystems
Allows the app to mount and unmount filesystems for removable storage.
disable keylock
Allows the app to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
write sync settings
Allows the app to modify the sync settings, such as whether sync is enabled for the People app.
modify global system settings
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
change Wi-Fi state
Allows the app to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
write subscribed feeds
Allows the app to modify your currently synced feeds. Malicious apps may change your synced feeds.
Bluetooth administration
Allows the app to configure the local Bluetooth tablet, and to discover and pair with remote devices. Allows the app to configure the local Bluetooth phone, and to discover and pair with remote devices.
An update for itstates that it can access the camera on the tablet. Now why would an app need to be able to turn on the camera-and access the microphone, anytime someone wanted to? Goes without saying, but I don't want some Orwellian Big Brother surreptitiously watching me, knowing where I am, or what I'm doing.
Is there anyway to block what an app can do, or do you simply pass on installing it?