Allows an application to access coarse (e.g., Cell-ID, WiFi) location.
Allows an application to access fine (e.g., GPS) location.
Allows applications to access information about networks
Allows applications to access information about Wi-Fi networks.
Allows applications to connect to paired bluetooth devices
Allows applications to discover and pair bluetooth devices.
Allows an application to broadcast sticky intents. These are broadcasts whose data is held by the system after being finished, so that clients can quickly retrieve that data without having to wait for the next broadcast.
Allows applications to change Wi-Fi connectivity state.
Allows access to the list of accounts in the Accounts Service .
Allows an application to get information about the currently or recently running tasks: a thumbnail representation of the tasks, what activities are running in it, etc.
Allows applications to open network sockets.
Allows an application to modify global audio settings.
Allows an application to read the low-level system log files. Log entries can contain the user's private information, which is why this permission is 'dangerous'.
Allows read only access to phone state.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user.
Allows an application to record audio.
Allows access to the vibrator.
Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
Allows an application to write to external storage.
Allows an application to read or write the system settings.