{"id":30289,"date":"2014-08-06T09:14:18","date_gmt":"2014-08-06T16:14:18","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=30289"},"modified":"2014-08-08T09:23:08","modified_gmt":"2014-08-08T16:23:08","slug":"app-permissions-android-vs-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/","title":{"rendered":"Why App Permissions on Androids are so Much Sloppier than iPhones"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30385\" alt=\"Android vs iOS\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-600x300.jpeg\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nThe Mac Security Blog from Intego is (surprise surprise&#8230;) a particularly popular read for those who own Apple Macs and MacBooks, and are keen to know how to keep their treasured devices safe and secure.<\/p>\n<p>But we&#8217;re not blinkered enough to think that some of you might not have been lured to &#8220;the other side&#8221; and bought an Android smartphone or tablet, rather than an iPhone or iPad, to run alongside your Cupertino-designed desktops and laptops.<\/p>\n<p>However, whether you have chosen to stay loyal to Apple, or are the proud owner of an Android, if you&#8217;re interested in security and privacy you should be aware of the different approaches taken by the two warring operating systems.<\/p>\n<p>Leo Mirani, a reporter with Quartz, has <a title=\"Link to Quartz article\" href=\"http:\/\/qz.com\/241243\/this-seemingly-trivial-detail-reveals-the-profound-differences-between-apple-and-google\/\" target=\"_blank\" rel=\"nofollow\">described<\/a> the different approaches taken by Apple and Google when it came to giving users greater control over what personal information is shared with mobile apps.<\/p>\n<p>The difference can perhaps be most immediately explained by showing you the following screenshot, posted on Twitter, of what one Android user saw when he updated a Canadian banking app on his tablet:<\/p>\n<blockquote class=\"twitter-tweet\" width=\"500\">\n<p>These are the permissions my bank&#39;s Android app is asking for. Are they crazy? Am I crazy? <a href=\"http:\/\/t.co\/Yj2zKrT8DP\">pic.twitter.com\/Yj2zKrT8DP<\/a><\/p>\n<p>&mdash; Tim Bray (@timbray) <a href=\"https:\/\/twitter.com\/timbray\/statuses\/370239201091919872\">August 21, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Should a banking app *really* need access to your location, your camera, or a list of what other apps you might be running?<\/p>\n<p>Well, I can see such behaviour making many people nervous. At the same time, I imagine it could be argued that knowing a device&#8217;s GPS location might help stem fraud if the device fell into the wrong hands, and that a camera might be handy if you needed to take a snapshot of a cheque, and seeing what other apps are running might help harden security against malware and poorly-written code.<\/p>\n<p>Similarly, at first you might imagine that a banking app being able to access your address book is creepy behaviour, but it could be handy if you wanted to fill in forms to make payments to friends and family more easily. And maybe even a bank app might have a legitimate reason to make phone calls if, say, it offered the ability to speak directly to the bank&#8217;s support team.<\/p>\n<p>So, it *is* possible to argue that this Android banking app might have a legitimate reason to interact with these different parts of your phone, but the fundamental problem is this:<\/p>\n<ul>\n<li>The app doesn&#8217;t tell you WHY it needs each of these permissions<\/li>\n<li>The app doesn&#8217;t let you CHOOSE which of the permissions you wish to grant, and which you wish to decline. It&#8217;s all or nothing.<\/li>\n<li>You only get informed of the permissions the app requires at install time. After that, you&#8217;re left in the dark as to what it is doing as you have already granted permission.<\/li>\n<\/ul>\n<p>In short, it&#8217;s no surprise that some Android users feel a little uneasy when they install an app &#8211; even if it&#8217;s from the official Google Play store.<\/p>\n<p>Now, lets compare with how Apple handles the same kind of issue.<\/p>\n<p>As Leo Mirani explains, Apple doesn&#8217;t trouble the user at the point of app installation with any gobbledygook about permissions.<\/p>\n<blockquote><p>&#8220;On its mobile operating system, iOS, apps don\u2019t ask permission when they\u2019re installed. Instead, iOS takes some permissions as a given\u2014internet access for instance\u2014but for more sensitive data, such as your photos or location, the app has to ask for access when you use it. That more closely relates the decision to grant access to the reason for asking for it.&#8221;<\/p><\/blockquote>\n<p>On iOS, to use certain permissions\u2014specifically to access GPS location services, Calendars, Contacts, Photos, Reminders, Bluetooth, Microphone, Motion Activity, or your Twitter or Facebook account\u2014the app will need to request your permission when it is first required.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30325\" alt=\"iOS app requesting location access\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/ios-app-location-1.jpeg\" width=\"600\" height=\"267\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/ios-app-location-1.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/ios-app-location-1-150x66.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/ios-app-location-1-300x133.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In this way, iOS gives the user greater choice about what permissions they want to give an app, and which they don&#8217;t.<\/p>\n<p>It&#8217;s not the &#8220;all-or-nothing&#8221; approach of Android permissions. That&#8217;s good news for iPhone users, who no doubt are enjoying crowing at the misfortune of their Android cousins.<\/p>\n<p>Well, it looks like there will be more reasons to cheer if you went the iOS route soon. Because a new version of iOS is coming.<\/p>\n<p>What I&#8217;m particularly pleased to see is that Apple doesn&#8217;t appear to be resting on its laurels, but is actually working on improving app permissions in iOS 8.<\/p>\n<p>As app designer Luis Abreu <a title=\"Link to Abreu's blog post\" href=\"https:\/\/lmjabreu.com\/post\/ios-8-privacy-updates\/\" target=\"_blank\" rel=\"nofollow\">explains<\/a>, the next major version of iOS\u2014due later this year\u2014will see apps not just requesting your permission, but they&#8217;ll also *explain* why they are asking for it.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30358\" alt=\"iOS camera permission\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/camera.jpeg\" width=\"540\" height=\"327\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/camera.jpeg 540w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/camera-150x90.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/camera-300x181.jpeg 300w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/p>\n<p>You will be able to easily choose if you want an app to carry on monitoring your location, even when you aren&#8217;t using the app.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30364\" alt=\"Location in the background\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/weather.jpeg\" width=\"540\" height=\"405\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/weather.jpeg 540w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/weather-150x112.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/weather-300x225.jpeg 300w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/p>\n<p>And the operating system is clearly going to great efforts to keep users informed of what is happening on their iOS device, even using a double-height status bar to tell you if an app is using your location.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30367\" alt=\"Location in the background\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/fitness-location.jpeg\" width=\"600\" height=\"75\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/fitness-location.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/fitness-location-150x18.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/fitness-location-300x37.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>These, and other privacy updates coming in iOS 8, are detailed in <a title=\"Link to Abreu's blog post\" href=\"https:\/\/lmjabreu.com\/post\/ios-8-privacy-updates\/\" target=\"_blank\" rel=\"nofollow\">Abreu&#8217;s blog post<\/a>.<\/p>\n<p>None of this, of course, means that iOS apps are necessarily safe and trouble-free. It will still be possible for mischief-makers and the incompetent to create iOS apps that are sloppy with how they access and store your data, and what they might do with it.<\/p>\n<p>But at least Apple appears to be putting the right tools in the hands of its users, allowing them to make simple decisions that will help them keep their private information out of harm&#8217;s way.<\/p>\n<p>And don&#8217;t forget &#8211; if at any point you decide that you want to review or change an app&#8217;s permissions, it&#8217;s easy to make a change on iOS.<\/p>\n<p>Simply go to <strong>Settings<\/strong> \/ <strong>Privacy<\/strong>, and you will be able to see what apps you have granted access to which services (and revoke their rights if you wish).<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30373\" alt=\"Privacy settings\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/privacy.jpeg\" width=\"320\" height=\"568\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/privacy.jpeg 320w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/privacy-84x150.jpeg 84w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/privacy-169x300.jpeg 169w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/p>\n<p>If you haven&#8217;t done so recently, I recommend you check that iOS setting right now. Who knows, you might be surprised by what you find.<\/p>\n<p>After all, you don&#8217;t want your Android-loving friends to have the last laugh do you?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps &#8211; just take a look at the different way they handle app permissions, for instance.<\/p>\n","protected":false},"author":34,"featured_media":30394,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[21,1282,3151,60,69,9,1285,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It&#039;s clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why App Permissions on Androids are so Much Sloppier than iPhones - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-06T16:14:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-08T16:23:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/\",\"name\":\"Why App Permissions on Androids are so Much Sloppier than iPhones - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage\"},\"datePublished\":\"2014-08-06T16:14:18+00:00\",\"dateModified\":\"2014-08-08T16:23:08+00:00\",\"description\":\"It's clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why App Permissions on Androids are so Much Sloppier than iPhones\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Why App Permissions on Androids are so Much Sloppier than iPhones\",\"datePublished\":\"2014-08-06T16:14:18+00:00\",\"dateModified\":\"2014-08-08T16:23:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage\"},\"wordCount\":1015,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg\",\"keywords\":[\"Android\",\"app permissions\",\"Apple\",\"Google\",\"iOS\",\"iPhone\",\"Luis Abreu\",\"Privacy\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It's clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/","og_locale":"en_US","og_type":"article","og_title":"Why App Permissions on Androids are so Much Sloppier than iPhones - The Mac Security Blog","og_description":"It's clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-08-06T16:14:18+00:00","article_modified_time":"2014-08-08T16:23:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/","name":"Why App Permissions on Androids are so Much Sloppier than iPhones - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage"},"datePublished":"2014-08-06T16:14:18+00:00","dateModified":"2014-08-08T16:23:08+00:00","description":"It's clear that Apple and Google are taking very different approaches when it comes to protecting users from misbehaving apps - just take a look at the different way they handle app permissions, for instance.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Why App Permissions on Androids are so Much Sloppier than iPhones"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Why App Permissions on Androids are so Much Sloppier than iPhones","datePublished":"2014-08-06T16:14:18+00:00","dateModified":"2014-08-08T16:23:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#webpage"},"wordCount":1015,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg","keywords":["Android","app permissions","Apple","Google","iOS","iPhone","Luis Abreu","Privacy"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/app-permissions-android-vs-iphone\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7Sx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/30289"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=30289"}],"version-history":[{"count":36,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/30289\/revisions"}],"predecessor-version":[{"id":30412,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/30289\/revisions\/30412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/30394"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=30289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=30289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=30289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}