The following description comes from the Google Play Store description of the app:Seeing everyday frustration surrounding us with all this happening to all the women. Making the capital and our country being labelled as not safe for women.
Discovering this fact motivated Me, Tarun and Manuj to create an App with the mission of solving this problem. After 146+ hrs of being locked in a room, this is what we have created www.suspectsregistry.com - which we can use to easily report any act of misbehaviour with women, managed by our facebook community http://www.fb.me/suspectsregistry - join us now and help us make this a stronger community to make WOMEN feel more SAFE.
LET's MAKE INDIA A SAFER COUNTRY FOR WOMEN !! AFFECT THOSE YOU LOVE.
Few features to begin with:
1) Track your location and keep up to 3 family members of yours, whenever you feel uncomfortable in any situation.
2) Hit PANIC Alarm not only notifies everyone with your latest Location but also with a 60 SECOND RECORDING of the panic situation you are in.
3) You can photograph any public transport and its driver - this will help us create a repository for every public transport and its driver.
4) You can also record any incident (i.e. any form of harassment to women) with picture - This helps us mark the safety of that area and help others to avoid that place at reported times.
5) Above all, Record Any Incident feature uploads the image instantly to our Facebook Page - bringing it notice to our community very quickly.
We will be testing this app (SUSPECT REGISTRY) till 15th Jan, 2013; during which all the incidents reported will be monitored but NO ACTION WILL BE TAKEN. This will help us smooth execution of the app after incorporating all of your feedback.
In case of any issue, feedback or suggestion FEEL FREE TO MAIL US AT - email@example.com
|Write call log||Can change your device’s call log including incoming and outgoing calls data||Not analyzed yet|
|Read call log||Can read your device’s call log, including incoming and outgoing calls||Not analyzed yet|
|Edit your text messages (sms or mms)||Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages.||Not analyzed yet|
|Modify or delete the contents of your usb storage||Can write to your phone's USB storage||Not analyzed yet|
|Modify your contacts||Can edit contacts on device||Not analyzed yet|
|Add or modify calendar events and send email to guests without owners\' knowledge||Allows an application to write the user's calendar data.||Not analyzed yet|
|Make/receive internet calls||Allows an application to use SIP service.||Not analyzed yet|
|Use accounts on the device||Allows the app to request authentication tokens.||Not analyzed yet|
|Draw over other apps||Can create alerts on other apps or parts of the user interface||Not analyzed yet|
|Write subscribed feeds||Allows the app to modify your currently synced feeds. Malicious apps may change your synced feeds.||Not analyzed yet|
|Send sms messages||Can send SMS messages||Not analyzed yet|
|Record audio||Can record audio through microphone on device||Not analyzed yet|
|Receive text messages (wap)||Allows an application to receive WAP push messages.||Not analyzed yet|
|Receive text messages (sms)||Can receive SMS messages||Not analyzed yet|
|Receive text messages (mms)||Allows an application to monitor incoming MMS messages.||Not analyzed yet|
|Read your text messages (sms or mms)||Can read SMS messages||Not analyzed yet|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||Not analyzed yet|
|Read your contacts||Can read user's contact list (phone book) and phone call history||Not analyzed yet|
|Read calendar events plus confidential information||Allows an application to read the user's calendar data.||Not analyzed yet|
|Reroute outgoing calls||Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether.||Not analyzed yet|
|Control near field communication||Allows applications to perform I/O operations over NFC.||Not analyzed yet|
|Add or remove accounts||Can manage user's accounts on the phone||Not analyzed yet|
|Close other apps||Allows an application to call killBackgroundProcesses(String).||Not analyzed yet|
|Full network access||Can access the internet||Not analyzed yet|
|Retrieve running apps||Can retrieve information on currently and recently running apps on the device||Not analyzed yet|
|Find accounts on the device||Can use user's account information stored on the phone||Not analyzed yet|
|Disable your screen lock||Allows applications to disable the keyguard if it is not secure.||Not analyzed yet|
|Delete all app cache data||Allows an application to clear the caches of all installed applications on the device.||Not analyzed yet|
|Connect and disconnect from wi-fi||Can connect to and disconnect from Wi-Fi access points||Not analyzed yet|
|Allow wi-fi multicast reception||Allows applications to enter Wi-Fi Multicast mode.||Not analyzed yet|
|Change network connectivity||Allows applications to change network connectivity state.||Not analyzed yet|
|Take pictures and videos||Can use camera or flashlight on the phone||Not analyzed yet|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Permanently disable tablet||Allows the app to disable the entire tablet permanently. This is very dangerous.||Not analyzed yet|
|Access bluetooth settings||Allows applications to discover and pair bluetooth devices.||Not analyzed yet|
|Pair with bluetooth devices||Can connect to user's Bluetooth devices||Not analyzed yet|
|Interact with a device admin||Must be required by device administration receiver, to ensure that only the system can interact with it.||Not analyzed yet|
|Create accounts and set passwords||Can use user's account authentication information (like password) or create new accounts||Not analyzed yet|
|Mock location sources for testing||Create mock location sources for testing or install a new location provider. This allows the app to override the location and/or status returned by other location sources such as GPS or location providers.||Not analyzed yet|
|Approximate location (network-based)||Can use user's approximate location||Not analyzed yet|
|Precise location (gps and network-based)||Can use user's precise location||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback