Protect Yourself: Know Which Apps Have Access to Your Location, Microphone and Camera

by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android


When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...

 

Smartphones have become the target of choice for hackers and criminals who want to make money or extort money from you by obtaining data or information about you or by using your smartphone for their own profit. In some cases, they are simply doing it to pass the time.

But it's not something we should worry about any more than when we access the computer. With some precautions and security measures, our smartphone and the content we store will be safe from unexpected access.

One of the things that cause most distrust and fear is the unauthorized access to items on your smartphone such as the location, microphone and camera. In the first case, because they can know where we are and where we are going during the day. No one likes to be spied on while talking to someone.

However, the functions mentioned are very useful. What would become of the current maps without the possibility of locating us on the map? Video calls would not be possible without access to the microphone and camera. In addition, without the microphone, it would not be possible to make calls.

As a precaution, for years both Apple's iOS and Google's Android have asked you what permissions you're going to give to a certain application before installing it on your smartphone. It also lets you know when it's going to be updated, if it adds or changes those permissions, and allows you to change the permissions at any time.

 

Location, microphone and camera on Android

 

Let's start with Android, the most popular platform and the one that suffers the most attacks in the form of malicious applications or malware available for Android. Although the latest versions of Android have a tool that analyzes applications to make sure they're safe, Google Play Protect, it doesn't hurt to check the permissions we give to apps ourselves from time to time.

On Android, permissions can be checked from several sites. Location, for example, is available in Settings > Location, where you can disable access to your map location for all apps and Android and review application permissions from Application Permission. In that list, you'll see which apps can always access your location, which can only do so when you're using them, and which have no access to your location or are denied.

Another way to access location permissions, in addition to microphone and camera related permissions, is to go to Settings > Privacy > Permissions Manager. Among other options you will see the ones that interest us, Camera or Microphone. As well as Location, you'll see which apps always have access, those that are only accessed while in use, and those that can't be accessed. At any time you can select an application and change its permissions.

 

Location, microphone and camera in iOS


In the operating systems of your iPhone and iPad, iOS and iPadOS respectively, the process for accessing the permissions you have granted to your applications is similar to Android, so it is not lost.

From Settings > Privacy you'll see all the possible permissions. When you access each one, you'll see which applications have permission and which don't, along with other options, as appropriate. Furthermore, you can revoke your authorisation at any time or grant authorisation if you do not have it.

protect yourself privacy apps

In Location, you'll see which applications can ask your iPhone or iPad where you are from the built-in GPS or using mobile or Wi-Fi connections. Otherwise, Microphone and Camera do the obvious.

In all permissions, apps can have constant access - only if you're using them or never. And when you first open an app, it may ask you for a specific permission. You can give it forever, deny it, or give it only once.



Technology vector created by stories - www.freepik.com
 
by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android hits : 2038  
 
Silvia Mazzetta

Silvia Mazzetta

Web Developer, Blogger, Creative Thinker, Social media enthusiast, Italian expat in Spain, mom of little 6 years old geek, founder of  @manoweb. A strong conceptual and creative thinker who has a keen interest in all things relate to the Internet. A technically savvy web developer, who has multiple  years of website design expertise behind her.  She turns conceptual ideas into highly creative visual digital products. 

 
 
 

Related Posts

Interesting and Helpful Google Search Features You’ll Want to Start Using

Google – THE search engine for many internet users. It has been with us since its launch back in 1998 and thanks to its simplicity of use and genius algorithms,…

Read comics online: best websites and apps to download and read digital comics

Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your…

How to use your browser as a file browser, in Chrome or Microsoft Edge

We're going to explain how to use the Chrome browser as a file browser, both on Android and on your computer. This is a hidden feature of Chromium that will…

Security of Internet providers: can we trust it?

This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the…

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising…

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of…

How to watch deleted or private Youtube videos

Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube…

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated…

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine…

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site.…

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration