Easy and useful app for managing all permissions used in backgroud on your smartphone. Be always informed about what permissions you give access to, and what information the app is collecting. Free version: Lists installed apps according to their risk priority (High Risk, Medium Risk, Low Risk, No Risk). Search bar for easily finding of an app. Detailed description of permission privileges the app enjoys. Easily remove any risky permissions. Sort apps by high and low risk level. Permission viewer: Filter easily apps by permission group categories /Calendar, Camera, Contacts, Location, Microphone, SMS, Storage, Phone, Sensors. App share. Pro version: Now the Professional version of Revo App Permission Manager provides more control of everything. Take a look and see the risky permissions you are giving to some applications without knowing. Allows applications to discover and pair bluetooth devices. Allows applications to change Wi-Fi connectivity state. Allows applications to open network sockets. Allows an application to modify global audio settings. Allows applications to perform I/O operations over NFC. Allows a companion app to run in the background. Allows using the device\'s IR transmitter, if available. Allows an app to use device supported biometric modalities. Allows access to the vibrator. Inn-app purchase and subscription. Allows an application to send SMS messages. Allows an application to record audio. Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. Access to precise location. We know that your privacy and security is one of the most important things in terms of control and knowledge. Revo App Permission Manager gives you the power to be always informed and to have the ability to control without you even knowing with your most sensitive information, like location, contacts, camera and even microphone. The main aim of the app permission is to protect the privacy of an Android user. Android apps must request permission to access sensitive user data such as Contacts and SMS, as well as certain system features such as Camera and Internet. Depending on the feature, the system might grant the permission automatically or might prompt the user to approve the request.