Allows read only access to phone state.
Allows access to the list of accounts in the Accounts Service .
Allows an application to get information about the currently or recently running tasks: a thumbnail representation of the tasks, what activities are running in it, etc.
Allows an application to read the low-level system log files. Log entries can contain the user's private information, which is why this permission is 'dangerous'.
Allows access to the vibrator.
Allows an application to expand or collapse the status bar.
Allows applications to open network sockets.
Allows applications to access information about networks
Allows an application to write to external storage.
Allows an application to change whether an application component (other than its own) is enabled or not.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user.
Allows an application to access coarse (e.g., Cell-ID, WiFi) location.
Allows an application to access fine (e.g., GPS) location.
Allows an application to create mock location providers for testing.
Allows applications to access information about Wi-Fi networks.
Allows applications to change Wi-Fi connectivity state.