Google won't approve Declared Permissions for a callback app [GVoice Callback] - Android Q&A, Help & Troubleshooting

Like everyone, I have to submit a Permissions Declarations Form for one of my apps, GVoice Callback, whose sole purpose is to Proxy Calls, which is an approved use case for three sensitive permissions: android.permission.PROCESS_OUTGOING_CALLS (for intercepting call), android.permission.READ_CALL_LOG, android.permission.WRITE_CALL_LOG (for maintaining a correct call log when calls are canceled).
For some reason, Google just won't approve it. Their policy enforcers kept responding that "We couldn’t verify the declared core functionality of your app during our review",despite multiple strenuous efforts to prepare video demos and detailed explanations to demonstrate how my app's core functionality is to Proxy Calls. Asked to clarify what part should be explained more, Google's appeal team simply replied that they could not give a better answer than the same stock, unspecific message I had already received.
Not sure if this is a common experience. I know that task automation, call recorder type of apps have been struggling with this issue, but my app is straight up a call proxy, but they just won't see it. I would think even without the video demo and the additional explanations I gave in my request, it'd be pretty obvious from the store listing (which is the same text here: gvoicecallback_netlify_com/#overview). I'm giving up now...

Related

Google's Device Policy app

My wife has a RAZR MAXX. Her company is transitioning their corporate email from Groupwise (I'm amazed they are still on it) to Google for Business.
They currently allow the use of BYOD for email access. She has been using Touchdown to access their Groupwise infrastructure. Before allowing access to the new email system, they are requiring the installation of Google's Device Policy App.
Is anyone here familiar with it? We're very interested in it's capabilities prior to allowing it on her phone. If we decide it's too intrusive, she will opt out of the email access.
I understand it has remote wipe, of email, or the entire system and that it can enforce a device lock timeout and PIN. Those are fairly standard.
What I'm more concerned with is the other capabilities that I've heard about. I've read where it can apparently use the camera to take pictures. It can also report on the phone's movements. Can anyone confirm this? And if so, is this something that the admins will have a console for that's supplied by Google, or is it something a third-party application is used for? Are there any indications of things such as this being activated remotely? Are there any ways to limit what it can do? Are there ways on the phone to determine what the specific active policy contains, and also receive notification if the policy was to change?
Any other info regarding this would be very much appreciated.
Thanks.
I don't have a lot of answers for you, and would actually like answers to a lot of the same questions.
What I do have to offer is that my school Exchange server requires me to grant it similar access. I've never had an issue related to it. It is a bit unnerving to connect to the email server for the first time and allow it to wipe the device, take photos, activate location services...
How they make use of this access? I'm not sure.
Personally, I've never heard anything about it other than the initial granting of access, and to my knowledge they have never made use of the privileges. So if they have used it, there have been no alerts to it, but I strongly doubt they have.
But at any rate, when I accepted the policy it very specifically outlined what it requests, and allows you to accept or deny. At least in the implementation I used.

Permissions management noob trying to understand android permissions better

Hi I am trying to understand permissions management a bit better, primarily what all the different things you can block etc are. Some of the things such as Call logs, Calendar, SMS etc are self explanatory, but other things (what they are and implications of access to) such as:
Device ID
Subscriber ID
SIM serial
Phone and mailbox number
Incoming call number
Outgoing call number
Network location
List of accounts
Account auth tokens
SIM info
Network info
Is there an FAQ/Guide that explains these things in detail that someone could point me to?
Thanks,
-Gaiko
Make phone calls
Services that cost you money
This permission is of moderate to high importance. This could let an application call a 1-900 number and charge you money. However, this is not as common a way to cheat people in today's world as it used to be. Legitimate applications that use this include: Google Voice and Google Maps.
Another important point to note here is that any app can launch the phone screen and pre-fill a number for you. However, in order to make the call, you would need to press [Send] or [Call] yourself. The difference with this permission is that an app could make the entire process automatic and hidden.
Send SMS or MMS
Services that cost you money
This permission is of moderate to high importance. This could let an application send an SMS on your behalf, and much like the phone call permission, it could cost you money by sending SMS to for-pay numbers. Certain SMS numbers work much like 1-900 numbers and automatically charge your phone company money when you send them an SMS.
Modify/delete SD card contents
Storage
This permission is of high importance. This will allow applications to read, write, and delete anything stored on your phone's SD card. This includes pictures, videos, mp3s, documents and even data written to your SD card by other applications. However, there are many legitimate uses for this permission. Many people want their applications to store data on the SD card, and any application that stores information on the SD card will need this permission. You will have to use your own judgment and be cautious with this permission knowing it is very powerful but very, very commonly used by legitimate applications. Applications that typically need this permission include (but are not limited to) camera applications, audio/video applications, document applications
WARNING: Any app targeting Android 1.5 or below (possibly 1.6 as well) will be granted this permission BY DEFAULT and you may not ever be warned about it. It is important to pay attention to what version of Android an app is targeting to know if this permission is being granted. You can see this on the Market website in the right hand column.
Read contact data, write contact data
Your personal information
This permission is of high importance. Unless an app explicitly states a specific feature that it would use your contact list for, there isn't much of a reason to give an application this permission. Legitimate exceptions include typing or note taking applications, quick-dial type applications and possibly social networking apps. Some might require your contact information to help make suggestions to you as you type. Typical applications that require this permission include: social networking apps, typing/note taking apps, SMS replacement apps, contact management apps.
Read calendar data, write calendar data
Your personal information
This permission is of moderate to high importance. While most people would consider their calendar information slightly less important than their list of contacts and friends, this permission should still be treated with care when allowing applications access. Additionally, it's good to keep in mind that calendar events can, and often do contain contact information.
Read/write Browser history and bookmarks
Your personal information
This permission is of medium-high importance. Browsing habits are often tracked through regular computers, but with this permission you'd be giving access to more than just browsing habits. There are also legitimate uses for this permission such as apps that sync or backup your data, and possibly certain social apps.
Read logs / Read sensitive logs
Your personal information / Development Tools
This permission is of very high importance. This allows the application to read what any other applications have written as debugging/logging code. This can reveal some very sensitive information. There are almost no reasons an applications needs this permission. The only apps I might grant this permission to would be Google apps. The name of this permission recently changed as it came to light how important and dangerous this permission can be. Both the old name and category and the new name and category are listed above.
Read phone state and identity
Phone calls
This permission is of moderate to high importance. Unfortunately this permission seems to be a bit of a mixed bag. While it's perfectly normal for an application to want to know if you are on the phone or getting a call, this permission also gives an application access to 2 unique numbers that can identify your phone. The numbers are the IMEI, and IMSI. Many software developers legitimately use these numbers as a means of tracking piracy though. This permission also gives an application to the phone numbers for incoming and outgoing calls.
WARNING: Any app targeting Android 1.5 or below (possibly 1.6 as well) will be granted this permission BY DEFAULT. And you may not ever be warned about it. It is important to pay attention to what version of Android an app is targeting to know if this permission is being granted. You can see this on the Market website in the right hand column.
(see image above)
Fine (GPS) location
Your location
While not a danger for stealing any of your personal information, this will allow an application to track where you are. Typical applications that might need this include (but are not limited to) restaurant directories, movie theater finders, and mapping applications. This can sometimes be used for location based services and advertising.
Coarse (network-based) location
Your location
This setting is almost identical to the above GPS location permission, except that it is slightly less precise when tracking your location. This can sometimes be used for location based services and advertising.
Create Bluetooth connection
Network Communication
Bluetooth (Wikipedia: Bluetooth) is a technology that lets your phone communicate wirelessly over short distances. It is similar to Wi-Fi in many ways. It itself is not a danger to your phone, but it does enable a way for an application to send and receive data from other devices. Typical applications that would need bluetooth access include: Sharing applications, file transfer apps, apps that connect to headset out wireless speakers.
Full internet access
Network Communication
This is probably the most important permission you will want to pay attention to. Many apps will request this but not all need it. For any malware to truly be effective it needs a means by which to transfer data off of your phone; this is one of the settings it would definitely have to ask for.
However, in this day and age of cloud computing and always-on internet connectivity, many, many legitimate applications also request this.
You will have to be very careful with this setting and use your judgment. It should always pique your interest to think about whether your application needs this permission. Typical applications that would use this include but are not limited to: web browsers, social networking applications, internet radio, cloud computing applications, weather widgets, and many, many more. This permission can also be used to serve Advertising, and to validate that your app is licensed. (Wikipedia article on DRM).
View network state / Wi-Fi state
Network communication
This permission is of low importance as it will only allow an application to tell if you are connected to the internet via 3G or Wi-Fi
Discover Known Accounts
Your accounts
This permission is of moderate-high importance. This allows the application to read what accounts you have and the usernames associated with them. It allows the app to interact with permission related to that account. An example would be an app that was restoring your contact, would discover your Google account then send you to Google's login screen. It doesn't actually get to see your password, but it gets to work with the account. This is also legitimately used by applications to add contacts to your accounts, such as dialer replacements and contact managers/backup/sync/etc.
Manage Accounts
Your accounts
This permission is of high importance. This allows the application to manage the accounts on your phone. For instance it would be used by a service like Facebook to add an account to your accounts list. It seems at this time unclear if this permission allows an app to delete accounts.
Use Credentials
Your accounts
This permission is of high importance. This will allow an application authorization to use your accounts. They do this typically by giving what's called an AuthToken depending on what account you use (Google/Facebook/Yahoo/Last.fm/Microsoft/etc.). It's not as scary as it sounds however, it does typically protect your password from being seen by the application. However, it's still a very important permission you should give only with great caution.
Read/modify Gmail
Your messages
This permission is of high importance. Few apps should need access to your Gmail or email account. Email is also a prime method for managing accounts with other companies and services. For example, someone with control over your email could request a new password from your bank. While this is the worst case scenario, and there are various legitimate uses for this permission, it's still best to treat all email related permissions with extreme care.
Install Packages
System tools
This permission is of critical importance. This allows an application to install other applications on your system. This can be exploited by virus writers to install adware and malware on your system without your knowledge. It is a very, very dangerous permission and should almost NEVER be granted to a typical app. The only legitimate uses for this permission are for Market-like apps such as the Amazon AppStore or the Android Market.
Prevent phone from sleeping
System tools
This is almost always harmless. Sometimes an application doesn't expect the user to interact with the phone directly, and therefore may need to keep the phone from going to sleep. Many applications will often request this permission. Typical applications that use this are: Video players, e-readers, alarm clock 'dock' views and many more.
Modify global system settings
System tools
This permission is pretty important but only has the possibility of moderate impact. Global settings are pretty much anything you would find under Android's main 'settings' window. However, a lot of these settings may be perfectly reasonable for an application to change. Typical applications that use this include: volume control widgets, notification widgets, settings widgets, Wi-Fi utilities, or GPS utilities. Most apps needing this permission will fall under the "widget" or "utility" categories/types.
Read sync settings
System tools
This permission is of low impact. It merely allows the application to know if you have background data sync (such as for Facebook or Gmail) turned on or off.
Restart other applications
System tools
This permission is of low to moderate impact. It will allow an application to tell Android to 'kill' the process of another application. However, any app that is killed will likely get restarted by the Android OS itself.
Retrieve running applications
System tools
This permission is of moderate impact. It will allow an application to find out what other applications are running on your phone. While not a danger in and of itself, it would be a useful tool for someone trying to steal your data. Typical legitimate applications that require this permission include: task killers and battery history widgets.
Control Vibrator
Hardware controls
This permission is of low importance. As it states, it lets an app control the vibrate function on your phone. This includes for incoming calls and other events.
Take Pictures & Video
Hardware controls
This permission is of moderate importance. As it states, it lets an app control the camera function on your phone. In theory this could be used maliciously to snap unsuspecting photos, but it would be unlikely and difficult to get a worthwhile picture or video. However, it is not impossible to make malicious use of cameras.
wow, thats perfect thanx!

[Q] Excessive Permissions?

I'm after the advice of someone who knows about Android permissions and security.
I'd like to make use of this app - https://play.google.com/store/apps/details?id=com.faradayinstitute&hl=en
That requires these permissions:
This app has access to these permissions:
Your messages
receive text messages (SMS)
Network communication
full network access
view network connections
view Wi-Fi connections
Phone calls
read phone status and identity
Storage
modify or delete the contents of your USB storage
Microphone
record audio
Your social information
read your contacts
modify your contacts
read call log
write call log
Your accounts
find accounts on the device
System tools
send sticky broadcast
test access to protected storage
Affects battery
control vibration
prevent device from sleeping
Your applications information
run at startup
Audio settings
change your audio settings
But isn't that list of permissions completely OTT? I expressed my concerns to them and received the following reply:
I am writing to update you with regards to your enquiry about the Faraday App. I have been in touch with our developers and they have informed me that although this is a long list it is quite common with Android. They are currently working to see if they can reduce the list, however, there is nothing to worry about since you know the origin of there App, The Faraday Institute, and therefore can easily determine whether you wish to allow access (if it is a source you trust/is reputable etc..). The reason they need access to some parts is simply to add their details to your phone, (access your phone book for example is only to add The Faraday to your contacts).
I hope this answers your query for now. I will update you when I receive more information from the developers. Please feel free to contact me if you require further assistance.
I'm no expert but it doesn't really seem satisfactory - or am I worrying necessarily?
Ergates said:
I'm after the advice of someone who knows about Android permissions and security.
I'd like to make use of this app - https://play.google.com/store/apps/details?id=com.faradayinstitute&hl=en
That requires these permissions:
This app has access to these permissions:
Your messages
receive text messages (SMS)
Network communication
full network access
view network connections
view Wi-Fi connections
Phone calls
read phone status and identity
Storage
modify or delete the contents of your USB storage
Microphone
record audio
Your social information
read your contacts
modify your contacts
read call log
write call log
Your accounts
find accounts on the device
System tools
send sticky broadcast
test access to protected storage
Affects battery
control vibration
prevent device from sleeping
Your applications information
run at startup
Audio settings
change your audio settings
But isn't that list of permissions completely OTT? I expressed my concerns to them and received the following reply:
I am writing to update you with regards to your enquiry about the Faraday App. I have been in touch with our developers and they have informed me that although this is a long list it is quite common with Android. They are currently working to see if they can reduce the list, however, there is nothing to worry about since you know the origin of there App, The Faraday Institute, and therefore can easily determine whether you wish to allow access (if it is a source you trust/is reputable etc..). The reason they need access to some parts is simply to add their details to your phone, (access your phone book for example is only to add The Faraday to your contacts).
I hope this answers your query for now. I will update you when I receive more information from the developers. Please feel free to contact me if you require further assistance.
I'm no expert but it doesn't really seem satisfactory - or am I worrying necessarily?
Click to expand...
Click to collapse
what kind of app is it? (currently unable to access playstore)
mjz2cool said:
what kind of app is it? (currently unable to access playstore)
Click to expand...
Click to collapse
Just a "news" app. Here's the description:
The official application of The Faraday Institute for Science and Religion at St Edmund's College, Cambridge. Access news, leading stories of the day, educational resources, and much more, from the institute that is leading research in the understanding of the relation between science and religion.
Bump
Ergates said:
Bump
Click to expand...
Click to collapse
And once more for luck!
Ergates said:
And once more for luck!
Click to expand...
Click to collapse
Any views?

Rooted OP6 user with an odd request involving app communication

I have a situation involving tinder. I managed to get myself banned through their platform by using sarcastic profile details that was violation of their policy. I kind of was playing with fire here as I had continued to see fake accounts make it onto the platform, and wanted to test their security. I basically ****ed myself.
So I've contacted them and they told me that my phone number and Facebook was banned. I used new phone numbers, Facebook accounts, play store account, a VPN, even a new device to see if they were able to ban based on the MAC address of the device. I still manage to get auto banned. So I think it was because tinder communicates with Facebook automatically. I am unable to use my Facebook on the device I use with a tinder account. My question is this: is there a way to block applications from communicating with each other behind the scenes, as in a way for tinder to not be able to see that Facebook is even installed. I know there has to be a way. I'm actually more interested in learning about this way than I am with using tinder. It's quite funny, actually. :laugh:
Are there any devs that know if there's a way to edit the coding of the program and how to do it? I do recall there being an app that allows you to change the structure of an app by altering it's values such as true to false or 000 to 001 etc.
Feel free to move this post or redirect me. I was gonna post this in the Android mods tab, but it says devs only so I figure I'd respect that fwiw.

Rooted OP6 user with an odd request involving app communication

I have a situation involving tinder. I managed to get myself banned through their platform by using sarcastic profile details that was violation of their policy. I kind of was playing with fire here as I had continued to see fake accounts make it onto the platform, and wanted to test their security. I basically ****ed myself.
So I've contacted them and they told me that my phone number and Facebook was banned. I used new phone numbers, Facebook accounts, play store account, a VPN, even a new device to see if they were able to ban based on the MAC address of the device. I still manage to get auto banned. So I think it was because tinder communicates with Facebook automatically. I am unable to use my Facebook on the device I use with a tinder account. My question is this: is there a way to block applications from communicating with each other behind the scenes, as in a way for tinder to not be able to see that Facebook is even installed. I know there has to be a way. I'm actually more interested in learning about this way than I am with using tinder. It's quite funny, actually. :laugh:
Are there any devs that know if there's a way to edit the coding of the program and how to do it? I do recall there being an app that allows you to change the structure of an app by altering it's values such as true to false or 000 to 001 etc.
Feel free to move this post or redirect me. I was gonna post this in the Android mods tab, but it says devs only so I figure I'd respect that fwiw.
MOD ACTION:
Thread closed as duplicate.

Categories

Resources