<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">Those are applications that <div class=""><br class=""></div><div class="">1. You choose to install</div><div class="">2. You choose to specifically grant those permissions to</div><div class=""><br class=""><div><blockquote type="cite" class=""><div class="">On 29-Oct-2015, at 11:28 AM, parminder <<a href="mailto:parminder@itforchange.net" class="">parminder@itforchange.net</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><p style="margin-bottom: 0cm; font-family: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255);" class="">Avast CEO shared analysis done by company of top 100 applications on Android in the month of September.<br class=""><br class="">As per the analysis, 99 per cent of these applications have entire control of mobile phone which means they remotely operate phone as a user does and 92 per cent can view network connections.<br class=""><br class="">One out of 10 of top 100 applications can record audio and take pictures and videos and 9 out of 10 are able to read storage content which can modify or delete, as per the report.</p><br class="Apple-interchange-newline"></div></blockquote></div><br class=""></div></body></html>