Teach you to supervise the running of the app - see if they are secretly doing it?

  
Due to the openness of the Android system, many apps will run various permissions that we don't know in the background, which not only reveals our privacy, but also brings great security risks to the system itself. And now it's very common that when you install the app, it always asks for a lot of permissions, it is a photo and a geographical location, and you can't install it. Even if I agree, I believe that our hearts are still a bit small, then how do we prevent and manage the permissions of the APP? At the glance, you can see the permissions of an app. We can view the permissions of the app at the time of installation. Just switch to the <quo;Permissions & Rarr; All ”, Permissions below. The list shows all the permissions that the app will use (see Figure 1). Figure 1 Therefore, when installing the application, we must carefully check the permissions, try not to install applications that are not related to the main function of the application, but also related to reading the privacy of the mobile phone (such as address book, SMS). For example, some game software, if you have permission to read the local contact record, you should pay attention to it, try not to install these software. For applications that are already installed on this machine, just go to “Settings →Application Management", expand the "Permissions" below, click “Show All" to see all permissions for the app. If you want to see the app's permission history, you can use the &Lquo;LBE Security Master”. Start "<LBE Security Master" and switch to "Active Defense & Rarr; Software Rights Management & Rarr; Privacy Related", where you can see all related applications related to privacy permissions (see Figure 2). For example, you need to check what apps view “contact history”, click “contact history” to see all monitored apps. Figure 2 above shows the permission record after the application is running. If you install the “LBE Security Master” and allow it to run in the background, then if each monitored application starts, if there is a privacy read action, LBE security Masters will monitor in real time in the background, we can just click on the notification bar to see it (see Figure 3). In addition, through the “LBE Security Master” security log, we can also view the interception records in chronological order to confirm which applications are reading the privacy record. Figure 3 polishes the eyes, how to set common application permissions, you will install a variety of applications on your mobile phone, then what are the common applications, and which permissions will reveal our privacy? Below we introduce the common privacy permissions of some typical software according to the APP category, and give specific closure/opening suggestions. After testing, closing the permissions does not affect the operation of the application itself. Other similar similar software, you can refer to the settings. 1. Communication/WeChat Suggested permission to close: Positioning: Because it will leak our location information, if you do not use the location service, it is recommended to close. Read phone status and identity: easy to disclose our personal information, close the use of WeChat completely does not affect the open permission: read contacts, write contact data: because many friends micro-signal suitable for mobile phone number association, open this service is convenient Contact your friend. Create a Bluetooth connection, full Internet access: This service is required for WeChat networking. Modify/delete SD card content: Because we often use WeChat to send/receive files, we need to write this permission to write SD card to change audio settings, recording, photo and video: because we often use WeChat to send pictures, voice communication 2. Browser Class/UC Browser Suggested Closed Permissions: Targeting: Location information will be revealed. If you do not use the Map Location Service, it is recommended to turn off hardware control: This permission is independent of the browser's main function. Read the phone status and identity: For the same reason, keep the open permission: View browsing history and records, check sensitive system logs: This permission allows us to view browsing records to modify/delete SD card content: UC download files need to write this permission to SD card network communication: browser networking necessary services 3. Input method /Sogou input method suggests to close the permission: Positioning: reveal personal location information, and check the sensitive system log regardless of the main function, read the contact data: the main function of this permission is that when we find the contact, after entering the matching characters, Sogou can Quickly display contacts. For privacy protection, it is recommended to turn it off. Recording, taking photos, and videos: This permission is used when users and friends share emoticons and use them when writing MMS messages. If there is no such requirement, it is recommended to close it. Read phone status and identity: Regardless of the input main function, it is recommended to turn off the reserved network communication and storage: Sogou input method to update the font, share emoticons, and synchronize user configuration. 4. Desktop plug-in/ink weather suggestion Close permission: Positioning: used to confirm the user's current location and push real-time weather. If there is no frequent travel user, it is recommended to turn off the sensitive system log: regardless of the main function, it is recommended to turn off recording, taking photos and videos: This permission is only shared by friends when shooting the current location weather environment photo. Without this requirement, the user suggests to turn off the read phone status and identity: it is easy to disclose personal information, and has nothing to do with the main function. It is recommended to turn off the reserved permission: Network: Automatically update the weather Need to use storage: save the current location information data to the SD card 5. Mailbox class /Netease mailbox recommended to close the permissions: read the phone status and identity: just to facilitate the identification of mobile phone mailbox users, not using the mobile phone mailbox users recommended to turn off recording, photo and video: It is convenient for users to compose multimedia emails. Without this requirement, users recommend to turn off reserved permissions: view browsing history and records: used to record access to WEB mailbox record network: send/receive, synchronize mail necessary network permission storage: save mail data, attachments, need to write Into the SD card 6. Mobile phone Assistant /pea pods recommended to close permissions: get SMS, get contact data, write contact data: used to back up contact data to the computer when connected to the computer, no user needs to close the sending SMS: easy to generate costs, just use Calling the SMS function on the PC, without this requirement, the user recommends turning off the camera and video: regardless of the main function, it is recommended to turn off the reserved permission: view the browser history, view the sensitive system data: used to find, search and retain the downloaded application record Network, storage: used to download and upgrade applications, install applications to read phone status and identity: used to confirm mobile phone information, easy to download suitable for your mobile phone application 7. File Management /ES file browser recommended to close permissions: Network: use its own Networked users with network disk, easy to consume mobile phone traffic, it is recommended to turn off the read phone status and identity: independent of the main function, easy to disclose personal information retention permissions: storage: easy to delete, copy, paste and other operations 8. System optimization /Android Optimizer recommends closing permissions: check sensitive system data, Contact data, write contact data: It is not related to the main function, it is easy to disclose personal information, it is recommended to turn off the positioning: it has nothing to do with the main function, it is easy to disclose personal information, it is recommended to turn off the direct call phone: off, and the main function has nothing to do, it is easy to cause extra call charges Network: It is convenient to connect to the network, transfer synchronization and optimize data to the website server. It is recommended to turn off the read phone status and identity, and intercept the outgoing call: used to optimize the harassment phone interception that comes with the master. The actual function is not significant, and it is easy to disclose personal information. Close reserved permission: Storage: need to delete SD card data 9. Audio and video playback /Everyday sounds recommended to close permissions: Positioning: Independent of the main function, easy to disclose personal information Read phone status and identity: Independent of the main function, easy to disclose personal information retention Permissions: Network: used to synchronize and download lyrics, retrieve song information storage: write SD card lyrics file to refuse privacy disclosure, manage the permissions of the application through the above description, we see that many applications used daily have "sneak peek" The vice of privacy. So how to prevent it? If your system is not a version above 4.3, we will not be able to manage permissions through the components of the Android system. However, we can use the above-mentioned "LBE Security Master" to use it to set the permissions of the application. Ibid., for example, the “Photo and Video Permissions” permission is restricted to “Ink Weather”. First enter the “LBE Security Master” "Software Rights Management" page, then expand “Privacy Related & Rarr;Photo & Video", select "Ink Weather" in the open window, then expand “ Software permissions → photo and video & rarr; prohibit & rdquo;, shield this software can be used. In this way, when the menu of the ink weather calls the “Photographing” function, “LBE Security Master” will intercept in the background. Similarly, we can use it to reasonably limit other software permissions. Figure 4 summarizes: Permission management to maintain a balance between protecting privacy and normal use of software The openness of Android system permissions has been criticized, as the proliferation of application permissions has led to instances of user privacy leaks. Therefore, in order to better protect privacy, we must have a comprehensive understanding of the permissions installed in the native application, and master the management skills of permissions. However, the protection of privacy is important. The management of permissions must be based on the specific functions of the software and their actual application. In many cases, excessive permission protection may affect the normal use of the software. For example, WeChat's positioning function, many friends like to use it to share the location with friends, if you limit the positioning permissions of WeChat, then its function can not be used.  
Copyright © Windows knowledge All Rights Reserved