Protect yourself: know which apps have access to your location, microphone and camera

by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...

 

Smartphones have become the target of choice for hackers and criminals who want to make money or extort money from you by obtaining data or information about you or by using your smartphone for their own profit. In some cases, they are simply doing it to pass the time.

But it's not something we should worry about any more than when we access the computer. With some precautions and security measures, our smartphone and the content we store will be safe from unexpected access.

One of the things that cause most distrust and fear is the unauthorized access to items on your smartphone such as the location, microphone and camera. In the first case, because they can know where we are and where we are going during the day. No one likes to be spied on while talking to someone.

However, the functions mentioned are very useful. What would become of the current maps without the possibility of locating us on the map? Video calls would not be possible without access to the microphone and camera. In addition, without the microphone, it would not be possible to make calls.

As a precaution, for years both Apple's iOS and Google's Android have asked you what permissions you're going to give to a certain application before installing it on your smartphone. It also lets you know when it's going to be updated, if it adds or changes those permissions, and allows you to change the permissions at any time.

 

Location, microphone and camera on Android

 

Let's start with Android, the most popular platform and the one that suffers the most attacks in the form of malicious applications or malware available for Android. Although the latest versions of Android have a tool that analyzes applications to make sure they're safe, Google Play Protect, it doesn't hurt to check the permissions we give to apps ourselves from time to time.

On Android, permissions can be checked from several sites. Location, for example, is available in Settings > Location, where you can disable access to your map location for all apps and Android and review application permissions from Application Permission. In that list, you'll see which apps can always access your location, which can only do so when you're using them, and which have no access to your location or are denied.

Another way to access location permissions, in addition to microphone and camera related permissions, is to go to Settings > Privacy > Permissions Manager. Among other options you will see the ones that interest us, Camera or Microphone. As well as Location, you'll see which apps always have access, those that are only accessed while in use, and those that can't be accessed. At any time you can select an application and change its permissions.

 

Location, microphone and camera in iOS


In the operating systems of your iPhone and iPad, iOS and iPadOS respectively, the process for accessing the permissions you have granted to your applications is similar to Android, so it is not lost.

From Settings > Privacy you'll see all the possible permissions. When you access each one, you'll see which applications have permission and which don't, along with other options, as appropriate. Furthermore, you can revoke your authorisation at any time or grant authorisation if you do not have it.

protect yourself privacy apps

In Location, you'll see which applications can ask your iPhone or iPad where you are from the built-in GPS or using mobile or Wi-Fi connections. Otherwise, Microphone and Camera do the obvious.

In all permissions, apps can have constant access - only if you're using them or never. And when you first open an app, it may ask you for a specific permission. You can give it forever, deny it, or give it only once.



Technology vector created by stories - www.freepik.com
 
by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android hits : 4186  
 
Silvia Mazzetta

Silvia Mazzetta

Web Developer, Blogger, Creative Thinker, Social media enthusiast, Italian expat in Spain, mom of little 9 years old geek, founder of  @manoweb. A strong conceptual and creative thinker who has a keen interest in all things relate to the Internet. A technically savvy web developer, who has multiple  years of website design expertise behind her.  She turns conceptual ideas into highly creative visual digital products. 

 
 
 

Related Posts

Android Hidden Codes: unveiling custom dialer codes and their functionality

In the world of Android smartphones, there exist numerous hidden codes that can unlock a treasure trove of functionalities and features. These codes, known as custom dialer codes, provide access…

Secret iPhone codes to unlock hidden features

We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the…

The ultimate cybersecurity checklist for programmers

In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect…

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We…

6 Best Alternative Privacy Focused Browsers in 2021

In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative…

Interesting and Helpful Google Search Features You’ll Want to Start Using

Google – THE search engine for many internet users. It has been with us since its launch back in 1998 and thanks to its simplicity of use and genius algorithms,…

Read comics online: best websites and apps to download and read digital comics

Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your…

How to use your browser as a file browser, in Chrome or Microsoft Edge

We're going to explain how to use the Chrome browser as a file browser, both on Android and on your computer. This is a hidden feature of Chromium that will…

Security of Internet providers: can we trust it?

This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the…

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising…

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of…

Clicky