Protect Yourself: Know Which Apps Have Access to Your Location, Microphone and Camera

by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...


Smartphones have become the target of choice for hackers and criminals who want to make money or extort money from you by obtaining data or information about you or by using your smartphone for their own profit. In some cases, they are simply doing it to pass the time.

But it's not something we should worry about any more than when we access the computer. With some precautions and security measures, our smartphone and the content we store will be safe from unexpected access.

One of the things that cause most distrust and fear is the unauthorized access to items on your smartphone such as the location, microphone and camera. In the first case, because they can know where we are and where we are going during the day. No one likes to be spied on while talking to someone.

However, the functions mentioned are very useful. What would become of the current maps without the possibility of locating us on the map? Video calls would not be possible without access to the microphone and camera. In addition, without the microphone, it would not be possible to make calls.

As a precaution, for years both Apple's iOS and Google's Android have asked you what permissions you're going to give to a certain application before installing it on your smartphone. It also lets you know when it's going to be updated, if it adds or changes those permissions, and allows you to change the permissions at any time.


Location, microphone and camera on Android


Let's start with Android, the most popular platform and the one that suffers the most attacks in the form of malicious applications or malware available for Android. Although the latest versions of Android have a tool that analyzes applications to make sure they're safe, Google Play Protect, it doesn't hurt to check the permissions we give to apps ourselves from time to time.

On Android, permissions can be checked from several sites. Location, for example, is available in Settings > Location, where you can disable access to your map location for all apps and Android and review application permissions from Application Permission. In that list, you'll see which apps can always access your location, which can only do so when you're using them, and which have no access to your location or are denied.

Another way to access location permissions, in addition to microphone and camera related permissions, is to go to Settings > Privacy > Permissions Manager. Among other options you will see the ones that interest us, Camera or Microphone. As well as Location, you'll see which apps always have access, those that are only accessed while in use, and those that can't be accessed. At any time you can select an application and change its permissions.


Location, microphone and camera in iOS

In the operating systems of your iPhone and iPad, iOS and iPadOS respectively, the process for accessing the permissions you have granted to your applications is similar to Android, so it is not lost.

From Settings > Privacy you'll see all the possible permissions. When you access each one, you'll see which applications have permission and which don't, along with other options, as appropriate. Furthermore, you can revoke your authorisation at any time or grant authorisation if you do not have it.

protect yourself privacy apps

In Location, you'll see which applications can ask your iPhone or iPad where you are from the built-in GPS or using mobile or Wi-Fi connections. Otherwise, Microphone and Camera do the obvious.

In all permissions, apps can have constant access - only if you're using them or never. And when you first open an app, it may ask you for a specific permission. You can give it forever, deny it, or give it only once.

Technology vector created by stories -
by Silvia Mazzetta Date: 20-04-2020 smartphones privacy apps tips security iphone android hits : 1499  
Silvia Mazzetta

Silvia Mazzetta

Web Developer, Blogger, Creative Thinker, Social media enthusiast, Italian expat in Spain, mom of little 6 years old geek, founder of  @manoweb. A strong conceptual and creative thinker who has a keen interest in all things relate to the Internet. A technically savvy web developer, who has multiple  years of website design expertise behind her.  She turns conceptual ideas into highly creative visual digital products. 


Related Posts

How to watch deleted or private Youtube videos

Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube…

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated…

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine…

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site.…

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on…

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from…

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However,…

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our…

How to run Android apps in Windows 10

Forget about having to constantly pick up your phone to see notifications or answer messages, Your Phone in Windows 10 is what you need and here we tell you how…

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through…

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair,…