The following description comes from the Google Play Store description of the app:If you want to pretend to be a hacker and show your friends how you are breaking into someone's phone - this app is for you! You can simulate breaking into device! It looks like a real hacker tool which can hack phone by Bluetooth!
How to use it?
1. Scan for available phones near
2. Select one which you want to hack into
3. Show the simulation of phone breaking to your friends! They will think that you are a real hacker!
Remember that it is not a real phone hacker! It will not hack into any device or break the phone's security!
Download "Hack into phone 2" for FREE!
|Pair with bluetooth devices||Can connect to user's Bluetooth devices||Internal|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||It appears this app uses this data to identify users for delivering targeted advertisement|
|Full network access||Can access the internet||It appears this app uses this data for targeted advertising|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Retrieve running apps||Can retrieve information on currently and recently running apps on the device||Not analyzed yet|
|Edit your text messages (sms or mms)||Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages.||Not analyzed yet|
|Connect and disconnect from wi-fi||Can connect to and disconnect from Wi-Fi access points||Not analyzed yet|
|Access bluetooth settings||Allows applications to discover and pair bluetooth devices.||Not analyzed yet|
|Draw over other apps||Can create alerts on other apps or parts of the user interface||Not analyzed yet|
|Read your text messages (sms or mms)||Can read SMS messages||Not analyzed yet|
|Send sms messages||Can send SMS messages||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback