The following description comes from the Google Play Store description of the app:If you want to show your friends that you are a real hacker and you can break into Wi-fi network - this app is for you! This is wifi hacker simulator! It looks like a real wi-fi hacker! But in fact it gives random passwords! Your friends will think that it is a real hacking tool!
How to use it?
1. Scan for available Wifi networks in range
2. Select wi-fi which you want to hack into
3. Show your friends how you are breaking into the network (simulation). They will think that you are a real hacker!
Remember that it is not a real wi-fi hacker! It will not break into Wifi and it will not give you real wi-fi password!
Download "Break into Wifi 2" for FREE!
|Connect and disconnect from wi-fi||Can connect to and disconnect from Wi-Fi access points||It appears this app uses this data for internal use within the app's functionality|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||It appears this app uses this data to identify users for delivering targeted advertisement|
|Full network access||Can access the internet||It appears this app uses this data for targeted advertising|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Edit your text messages (sms or mms)||Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages.||Not analyzed yet|
|Draw over other apps||Can create alerts on other apps or parts of the user interface||Not analyzed yet|
|Retrieve running apps||Can retrieve information on currently and recently running apps on the device||Not analyzed yet|
|Read your text messages (sms or mms)||Can read SMS messages||Not analyzed yet|
|Send sms messages||Can send SMS messages||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback