D g73ds0wwjmbyszcgify8mnxqqspbcioxyhdls 0v3bjs3wr1rolucpnj0n2oqp8ky

Suspects Registry - FOR WOMEN

Suspects Registry - FOR WOMEN

En app rgb wo 60

App Description

The following description comes from the Google Play Store description of the app:

Seeing everyday frustration surrounding us with all this happening to all the women. Making the capital and our country being labelled as not safe for women.

Discovering this fact motivated Me, Tarun and Manuj to create an App with the mission of solving this problem. After 146+ hrs of being locked in a room, this is what we have created www.suspectsregistry.com - which we can use to easily report any act of misbehaviour with women, managed by our facebook community http://www.fb.me/suspectsregistry - join us now and help us make this a stronger community to make WOMEN feel more SAFE.


Few features to begin with:
1) Track your location and keep up to 3 family members of yours, whenever you feel uncomfortable in any situation.

2) Hit PANIC Alarm not only notifies everyone with your latest Location but also with a 60 SECOND RECORDING of the panic situation you are in.

3) You can photograph any public transport and its driver - this will help us create a repository for every public transport and its driver.

4) You can also record any incident (i.e. any form of harassment to women) with picture - This helps us mark the safety of that area and help others to avoid that place at reported times.

5) Above all, Record Any Incident feature uploads the image instantly to our Facebook Page - bringing it notice to our community very quickly.

We will be testing this app (SUSPECT REGISTRY) till 15th Jan, 2013; during which all the incidents reported will be monitored but NO ACTION WILL BE TAKEN. This will help us smooth execution of the app after incorporating all of your feedback.

In case of any issue, feedback or suggestion FEEL FREE TO MAIL US AT - saurabh@realbox.in

Sensitive Permissions Used By This App
Permission What Why
Write call log Can change your device’s call log including incoming and outgoing calls data Not analyzed yet
Read call log Can read your device’s call log, including incoming and outgoing calls Not analyzed yet
Edit your text messages (sms or mms) Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages. Not analyzed yet
Modify or delete the contents of your usb storage Can write to your phone's USB storage Not analyzed yet
Modify your contacts Can edit contacts on device Not analyzed yet
Add or modify calendar events and send email to guests without owners\' knowledge Allows an application to write the user's calendar data. Not analyzed yet
Make/receive internet calls Allows an application to use SIP service. Not analyzed yet
Use accounts on the device Allows the app to request authentication tokens. Not analyzed yet
Draw over other apps Can create alerts on other apps or parts of the user interface Not analyzed yet
Write subscribed feeds Allows the app to modify your currently synced feeds. Malicious apps may change your synced feeds. Not analyzed yet
Send sms messages Can send SMS messages Not analyzed yet
Record audio Can record audio through microphone on device Not analyzed yet
Receive text messages (wap) Allows an application to receive WAP push messages. Not analyzed yet
Receive text messages (sms) Can receive SMS messages Not analyzed yet
Receive text messages (mms) Allows an application to monitor incoming MMS messages. Not analyzed yet
Read your text messages (sms or mms) Can read SMS messages Not analyzed yet
Read phone status and identity Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number Not analyzed yet
Read your contacts Can read user's contact list (phone book) and phone call history Not analyzed yet
Read calendar events plus confidential information Allows an application to read the user's calendar data. Not analyzed yet
Reroute outgoing calls Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. Not analyzed yet
Control near field communication Allows applications to perform I/O operations over NFC. Not analyzed yet
Add or remove accounts Can manage user's accounts on the phone Not analyzed yet
Close other apps Allows an application to call killBackgroundProcesses(String). Not analyzed yet
Full network access Can access the internet Not analyzed yet
Retrieve running apps Can retrieve information on currently and recently running apps on the device Not analyzed yet
Find accounts on the device Can use user's account information stored on the phone Not analyzed yet
Disable your screen lock Allows applications to disable the keyguard if it is not secure. Not analyzed yet
Delete all app cache data Allows an application to clear the caches of all installed applications on the device. Not analyzed yet
Connect and disconnect from wi-fi Can connect to and disconnect from Wi-Fi access points Not analyzed yet
Allow wi-fi multicast reception Allows applications to enter Wi-Fi Multicast mode. Not analyzed yet
Change network connectivity Allows applications to change network connectivity state. Not analyzed yet
Take pictures and videos Can use camera or flashlight on the phone Not analyzed yet
Directly call phone numbers Can call phone numbers Not analyzed yet
Permanently disable tablet Allows the app to disable the entire tablet permanently. This is very dangerous. Not analyzed yet
Access bluetooth settings Allows applications to discover and pair bluetooth devices. Not analyzed yet
Pair with bluetooth devices Can connect to user's Bluetooth devices Not analyzed yet
Interact with a device admin Must be required by device administration receiver, to ensure that only the system can interact with it. Not analyzed yet
Create accounts and set passwords Can use user's account authentication information (like password) or create new accounts Not analyzed yet
Mock location sources for testing Create mock location sources for testing or install a new location provider. This allows the app to override the location and/or status returned by other location sources such as GPS or location providers. Not analyzed yet
Approximate location (network-based) Can use user's approximate location Not analyzed yet
Precise location (gps and network-based) Can use user's precise location Not analyzed yet

Privacy Analysis

Version of the app analyzed:

Beta v3

App was last analyzed by Privacy Grade on:


Why does this app have this grade?

Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.

You can see more information about how we grade apps in our FAQ.

See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.

If you have issues about the information on this page, click the button below to send us feedback.

Send Us Feedback