Want to send a fake call to someone else? It''s easy-
1. Download this app
2. Have your friend download this app
3. Set up a call and pick your friend as the contact and send it
That''s it! Your friend will receive a fake call.
BOTH PPL MUST HAVE APP!
READ INSTRUCTIONS BEFORE USING! THIS APP USES TEXT MESSAGES TO WORK!
Application Permissions:
Receive sms- Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
Send sms- Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
Write sms- Allows application to write to SMS messages stored on your device or SIM card. Malicious applications may delete your messages.
Disable keyguard- Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
Wake lock- Allows an application to prevent the device from going to sleep.
Vibrate- Allows the application to control the vibrator.
Read contacts- Allows an application to read all of the contact (address) data stored on your device. Malicious applications can use this to send your data to other people.
Modify audio settings- Allows application to modify global audio settings such as volume and routing.
Write settings- Allows an application to modify the system''s settings data. Malicious applications can corrupt your system''s configuration.
Record audio- Allows application to access the audio record path.
Access drm-
Internet- Allows an application to create network sockets.
Read phone state- Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
Access coarse location- Access coarse location sources such as the cellular network database to determine an approximate device location, where available. Malicious applications can use this to determine approximately where you are.
No comments:
Post a Comment