App Permissions: What to Allow and What to Deny

A complete guide to app permissions on iPhone and Android — what each permission means, which are genuinely necessary, and the warning signs that an app is overstepping its legitimate needs.

App permissions guide for iOS and Android
1Why Permissions Matter

Why App Permissions Are a Critical Security and Privacy Issue

App permissions are the gateway through which applications access the sensitive capabilities of your smartphone — your camera, microphone, location, contacts, health data, and more. Every permission you grant extends trust to the app developer and, indirectly, to every third-party SDK, analytics library, and advertising network embedded in that app. In the modern app ecosystem, granting a single app access to your location may mean sharing that data with dozens of third-party companies you've never heard of.

The problem is compounded by permission creep — the gradual accumulation of access rights that apps accumulate over time, often without users realising. An app that legitimately needed your location when you first installed it three years ago may have since changed its privacy policy, been acquired by a data broker, or had a rogue SDK added in an update. Without regular audits, you may be continuously sharing data with apps that you no longer even actively use.

iOS provides the App Privacy Report — accessible at Settings → Privacy & Security → App Privacy Report — which shows exactly which apps accessed your microphone, camera, contacts, location, and photos in the past seven days. Android's Privacy Dashboard (Settings → Privacy → Privacy Dashboard) provides similar visibility. These tools make it straightforward to identify apps that are accessing sensitive data far more frequently than expected based on how you use them.

  • Principle of least privilege: Grant only the permissions an app genuinely needs to perform its stated function — nothing more.
  • Third-party SDKs: Many apps contain dozens of analytics and advertising libraries that independently access the permissions you've granted to the app.
  • Use iOS App Privacy Report: Review which apps accessed your camera, microphone, and location in the past week — look for unexpected access patterns.
  • Use Android Privacy Dashboard: Android 12 and later provides a timeline view of permission usage by each app.
  • Permissions don't expire: Unless you revoke them, permissions granted years ago remain in effect — regular audits are essential.
  • Permission changes in updates: App updates can request new permissions — review permission changes before updating unfamiliar apps.
Learn how to protect your mobile data privacy →
App permissions privacy implications
2High-Risk Permissions

The Most Sensitive Permissions and When to Grant Them

Not all permissions carry equal risk. Location, microphone, camera, contacts, and health data are the highest-sensitivity permissions — their misuse can expose your physical whereabouts, enable covert surveillance, facilitate social engineering using your contacts list, and compromise your health privacy. Each of these should be granted only when there is a clear, legitimate justification for the specific app requesting it.

Location permission deserves particular scrutiny. On both iOS and Android, you can now grant location access "only while using the app" rather than "always" — use this more restrictive option for every app that doesn't have a genuine always-on use case (navigation, fitness tracking). Review whether apps are requesting "precise location" or "approximate location" — most apps can function with approximate location, and you should deny precise location to any app that cannot justify the need for it.

Microphone and camera access can enable covert recording. While both iOS (with its orange and green indicator dots) and Android (with its privacy indicator) show visible alerts when an app accesses these sensors, a compromised or malicious app could potentially access them without triggering these indicators. Restrict microphone and camera to only the apps — video calling, voice recorder, camera — that demonstrably require them, and review access regularly in your privacy report.

  • Location — only while using: Never grant "Always" location access to apps that don't have a justified continuous use case like navigation or fitness tracking.
  • Approximate vs precise location: Grant approximate location wherever possible; deny precise location to any app that doesn't genuinely need it.
  • Microphone: Grant only to video calling apps (FaceTime, Zoom, WhatsApp), voice assistants, and voice recorder apps — deny to everything else.
  • Camera: Grant only to apps with a clear photographic function — deny camera access to apps like weather, news, or utility apps that have no camera feature.
  • Contacts: Highly sensitive — your contacts list reveals your social network; grant only to communication apps and review what data is transmitted.
  • Health data: Grant only to dedicated health and fitness apps with clear privacy policies; be aware that health data has special legal protections in some jurisdictions but not Hong Kong.
Review all iOS privacy and permission settings →
High-risk app permissions camera microphone location
3Red Flags

Red Flags: Permission Requests That Should Raise Alarm

Legitimate apps request only the permissions they need to function. Malicious apps and privacy-invasive adware typically request far more permissions than necessary — sometimes requesting every available permission — because their purpose is data collection rather than the functionality advertised. Recognising these red flags at install time can prevent a problematic app from gaining access to your device in the first place.

The clearest red flag is a utility app — flashlight, QR code scanner, calculator, weather app, or system cleaner — requesting access to your microphone, camera, contacts, or location. There is no functional justification for a flashlight app accessing your contacts. These requests are universally a sign either of aggressive data collection for advertising purposes or, in the worst case, a malicious app designed to harvest personal data.

Accessibility permissions on Android deserve special scrutiny. These permissions — designed to help users with disabilities by giving apps the ability to observe and control other apps — are routinely abused by banking trojans. An app requesting accessibility permissions can read and intercept everything displayed on your screen, including banking apps, password managers, and authentication codes. Never grant accessibility permissions to any app other than explicitly designed accessibility tools and reputable screen readers.

  • Utility apps with surveillance permissions: Any basic utility app (torch, calculator, weather) requesting microphone, camera, or contacts is a definitive red flag.
  • Accessibility permissions (Android): Only grant to genuine accessibility tools — this permission can give apps full control over your device including reading banking screens.
  • Device administrator privileges: Legitimate apps rarely need device admin rights — any app requesting this should be refused and investigated.
  • Overlay permissions: Apps requesting "display over other apps" can show fake login screens on top of real banking apps — banking trojans rely on this permission.
  • All-at-once permission requests: An app that requests all permissions simultaneously at install, rather than contextually when a feature is first used, is behaving abnormally.
  • Requests after update: A previously benign app that suddenly requests new sensitive permissions after an update may have been acquired or repurposed for data collection.
Identify signs of spyware on your phone →
Red flag app permission requests
4Audit Your Permissions

How to Audit and Clean Up Your App Permissions

Conducting a permission audit takes less than 15 minutes and can dramatically reduce your app-based privacy and security exposure. The goal is to review every sensitive permission on your device — location, camera, microphone, contacts, photos, health, financial — and revoke access for any app that doesn't genuinely require it. This should be done at least quarterly and whenever you install a significant number of new apps.

On iPhone, the most efficient approach is to review permissions by type: go to Settings → Privacy & Security and work through each category — Location Services, Contacts, Calendars, Reminders, Photos, Microphone, Speech Recognition, Camera, Health, Tracking, and so on. For each category, you'll see a list of apps with access and the level of access granted. Revoke access for any app where the permission isn't clearly justified by the app's function.

On Android, the Permission Manager (Settings → Privacy → Permission Manager) provides a similar category-by-category view. Android also shows the "last used" timestamp for some permissions, making it easy to identify apps that accessed a sensitive sensor recently. For a more detailed view, Android's Privacy Dashboard shows a 24-hour timeline of permission usage, allowing you to identify unexpected access events and the specific apps responsible.

  • iOS audit path: Settings → Privacy & Security → review each category (Location, Camera, Microphone, Contacts, Photos, Health, Tracking).
  • Android audit path: Settings → Privacy → Permission Manager → review each permission category and the apps with access.
  • Check "last used": On Android, look for apps that accessed sensitive permissions recently but that you haven't consciously used — investigate or revoke.
  • Review after major app updates: Update changelogs rarely mention new data collection — check permissions after any app update that seems unusually large.
  • Photo library access: Limit photo library access to "Selected Photos" rather than full library access wherever possible.
  • Schedule recurring audits: Set a quarterly calendar reminder to spend 15 minutes reviewing and cleaning up app permissions on your device.
Configure Android security and privacy settings →
App permission audit guide
Privacy Starts with Permissions — Take Control Now

Privacy Starts with Permissions — Take Control Now

For a deeper dive into mobile privacy, our to Secure Your Smartphone: A Complete Guide">complete guide covers every dimension of how your smartphone collects and shares your personal data.

Related VPN Articles