Allows read/write access to the "properties" table in the checkin database, to change values that get uploaded.
Allows applications to access information about networks
Allows applications to connect to paired bluetooth devices
Allows applications to discover and pair bluetooth devices.
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call being placed.
Allows an application to modify the current configuration, such as locale.
Allows an application to clear user data .
Allows low-level access to power management.
Allows an application to retrieve state dump information from system services.
Allows access to hardware peripherals. Intended only for hardware testing.
Allows an application to modify global audio settings.
Allows modification of the telephony state - power on, mmi, etc. Does not include placing calls.
Allows mounting and unmounting file systems for removable storage.
Allows an application to read the low-level system log files. Log entries can contain the user's private information, which is why this permission is 'dangerous'.
Allows read only access to phone state.
Required to be able to reboot the device.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user.
Allows access to the vibrator.
Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
Allows applications to write the apn settings.
Allows an application to write to external storage.
Allows an application to read or write the secure system settings.
Allows an application to read or write the system settings.