Why Not Install Application in Our Android Phone.
These application is Data Collecting, Steal Data or sensitive information. install a malicious app without permission from the user.
Why Application ask Permission ?
Every Apps install in Android phone ask some permission in Phone from the user, that required for proper work flow of an application.
There are around 324 permission in android phone.
Types of Permission
- Normal Permission
- Signature Permission
- Dangerous permissions
- Special permissions
Normal permissions
Normal permissions cover areas where your app needs to access data or resources outside the app’s sandbox, but where there’s very little risk to the user’s privacy or the operation of other apps. For example, permission to set the time zone is a normal permission.
Signature permissions
The system grants these app permissions at install time, but only when the app that attempts to use a permission is signed by the same certificate as the app that defines the permission.
Dangerous permissions
Dangerous permissions cover areas where the app wants data or resources that involve the user’s private information, or could potentially affect the user’s stored data or the operation of other apps. For example, the ability to read the user’s contacts is a dangerous permission. If an app declares that it needs a dangerous permission, the user has to explicitly grant the permission to the app. Until the user approves the permission, your app cannot provide functionality that depends on that permission.
To use a dangerous permission, your app must prompt the user to grant permission at runtime. For more details about how the user is prompted.
Special permissions
There are a couple of permissions that don’t behave like normal and dangerous permissions. SYSTEM_ALERT_WINDOW
and WRITE_SETTINGS
are particularly sensitive, so most apps should not use them. If an app needs one of these permissions, it must declare the permission in the manifest, and send an intent requesting the user’s authorisation. The system responds to the intent by showing a detailed management screen to the user.
General Permission ask while Installing
there is reason behind the permission which is required for application but if application permission is not suitable with application then application can be a threat. Example a simple calculator app asking permission of contacts (which is not be suitable thing) combination of calculator with contacts is not good application avoid to install or if you already install the uninstall it.
Wi-Fi connection information ( view Wi-Fi connections ).
Photos/Media/Files ( modify or delete the contents of your USB storage, read the contents of your USB storage).
Microphone ( record audio )
Identity ( find accounts on the device,add or remove accounts)
Camera ( take pictures and videos)
Device & app history ( read your Web bookmarks and history)
Storage ( modify or delete the contents of your USB storage,read the contents of your USB storage)
Location {precise location (GPS and network-based) ,approximate location (network-based) }
Contacts ( find accounts on the device, read your contacts)
Others (download files without notification,read sync statistics, receive data from Internet, write web bookmarks and history, read sync settings, change your audio settings, use accounts on the device, install shortcuts, control Near Field , Communication, access Bluetooth settings, reorder running apps, read Google service configuration, view network connections, control vibration, full network access, toggle sync on and off, pair with Bluetooth devices, run at startup, prevent device from sleeping )
List of Application you not install
0-9 |
|
---|---|
A |
|
B |
|
C |
|
D |
|
E |
|
F |
|
G | |
H |
|
I | |
J |
|
K | |
L |
|
M |
|
N |
|
O | |
P |
|
Q |
|
R | |
S |
|
T |
|
U |
|
V |
|
W |
|
X | |
Y |
|
Z |
UC Browser
Reason
In 2017, It is under scanning by Indian Government. The government of any Country will not do this thing without any suspicious act, Proof, and issues.
In 2016, Citizen Lab also managed to bypass the encryption of UC Browser accusing them of using non-effective encryption systems in transmitting personally identifiable subscriber data, mobile device identifiers, and user geolocation data. LINK
Anti-malware company Malwarebytes detected UC Browser as a Trojan virus.
TIK TOC
Reason
There was also a vulnerability in a TikTok web domain which allowed attackers to insert a malicious code. This was used to retrieve personal information of users.
The app can potentially collect information on users.
News Dog
Reason
The study, commissioned by The Economic Times in the second week of January, reviewed the permissions sought and data shared by these apps among themselves or with third parties outside India. It also covered the various permissions sought by the apps to access features on users’ phones such as contacts, camera, microphone, sensors, location and text messages.
Read more at: LINK
Beauty Plus
Beauty Plus is use to add a makeup or cartoon filter on your face for more interesting selfies, or just to clean up some lower-quality pictures you took.
Reason
In the background, you’re not expecting these apps to scrape and sell your data, plague you with nonstop, malicious ads, redirect you to phishing websites, or even spy on you.
How Harmful These Apps Are?
- As per many research and reports, these apps can be used to deploy spyware, malware etc in your phone using the pop-up ads.
- A Spyware or Malware can keep and sends your data secretly to someone or on any server.
- Spyware Apps and scripts run in the background and are very hard to detect.
- The smartphone comes with at least 5 spyware apps (Known as Bloatware ) which are un-removable due to their installation in the system. Example:- Mi Store, Mi Video call-Xiaomi, Launchers
- These apps are almost the best in their field ( Ex.-Truecaller, Shareit, UC Browser) thus they are having the potential to carry out a very dangerous cyber-attack against the whole community or even country.