To gain access the application asks for your consent. For many users the unconditional reaction is to accept access but this puts the user at risk of having their data stolen. The most frequently cited example is " flashlight " applications that were available on the software vendor's official store. According to a report prepared by Avast Software sro the Top applications on Google Play that collected the most permissions on the phone were "Flashlights" and the number of permissions collected reached types of actions.
In addition to enabling the phone to turn on the light the application collected and sent text messages call logs etc. to an external recipient. The scope of permissions allowed for the introduction of further more dangerous malware Phone Number List programs onto the phone. Using only trusted sources is not sufficient security. Programs may undergo many changes during their existence not always beneficial to the user. Lack of knowledge of the regulations rules of operation In times of increasing competition on the electronic services market and the introduction of new ways of monetizing services offering "free" services is becoming more and more common.
Many users do not wonder what exactly "free" services are which puts them at risk of violating not only their own privacy but also the privacy of their loved ones or customers. The concept of "service in exchange for data" is an increasingly common form of service provision. The detailed rules of such services should always be described in the website or application's regulations. A popular Internet service is the "number recognition" service we enter a telephone number in the search engine and the website indicates who the given number belongs to.