{"id":6977,"date":"2020-06-23T10:54:14","date_gmt":"2020-06-23T15:54:14","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6977"},"modified":"2020-06-03T19:26:24","modified_gmt":"2020-06-04T00:26:24","slug":"how-to-keep-track-of-your-android-applications","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-keep-track-of-your-android-applications\/","title":{"rendered":"How To Keep Track Of Your Android Applications"},"content":{"rendered":"<p>Keeping track of application usage and the installation of software on your Android phone or tablet is an essential activity, both for device management and your overall security. In this regard, it\u2019s also advisable to monitor how your Android applications are tracking you, in terms of your physical location, activities on the local device, and online. Here are some tips on how to achieve this.<\/p>\n<h2>Assess All The Apps And Services Connected To Your Google Account<\/h2>\n<p>\u00a0<\/p>\n<p>Between the social media, online file storage, and team document sharing, it\u2019s easy to lose sight of all the applications on your device that maintain active links to your Google account \u2013 and how deep all of those connections actually run.<\/p>\n<p>\u00a0<\/p>\n<p>While granting application access to your Google account may be justifiable in a lot of cases, it\u2019s still a good idea to establish exactly what those apps are being given access to. Since you may have granted Google access to a lot of software over the course of time, it\u2019s also wise to revisit your settings and close the connections for any apps that you rarely or never use.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/1st-photo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6978\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/1st-photo.jpg\" alt=\"\" width=\"726\" height=\"667\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/1st-photo.jpg 726w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/1st-photo-300x276.jpg 300w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\"><\/a><\/p>\n<p>(Image source: <a href=\"https:\/\/images.idgesg.net\/images\/article\/2019\/12\/android-security-audit-app-access-100820862-orig.jpg\" rel=\"nofollow\" target=\"_blank\">Computerworld<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>)<\/p>\n<p>\u00a0<\/p>\n<p>First, log into your Google account, if you haven\u2019t already done so. This page in your Security settings displays a list of all applications that are currently authorized for account access. Run through the list, and if you spot any apps that you don\u2019t recognize or that you no longer use, click on the application name and then click the blue \u201cRemove Access\u201d button to cut off its connections.<\/p>\n<p>\u00a0<\/p>\n<h2>Check Your Application Permissions<\/h2>\n<p>\u00a0<\/p>\n<p>When you first install an application from the Play Store, you\u2019ll usually be presented with a list of all the permissions that it requires in order to run: access to your Contacts, Location, Camera, etc. In most cases it should be fairly obvious why the app is asking for these concessions. A weather app will typically require access to your current location, and permission to write data to your storage, for example.<\/p>\n<p>\u00a0<\/p>\n<p>But in many instances, a third-party application will ask for permissions that aren\u2019t strictly necessary for doing its job. Flashlights that need to know your location and contact information are the classic example, but there are loads of others.<\/p>\n<p>\u00a0<\/p>\n<p>If you grant the requested permissions to these apps (knowingly, or just because you didn\u2019t bother to read the list), you can find your personal data being shipped off to advertising networks or others in the partnership chain of the app developer. Worse, if there\u2019s undetected malware in an app, you could find your data being corrupted or stolen, or even lose control of your Android device entirely.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6979\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo.jpg\" alt=\"\" width=\"1200\" height=\"1232\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo.jpg 1200w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo-292x300.jpg 292w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo-997x1024.jpg 997w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/2nd-photo-768x788.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><\/a><\/p>\n<p>(Image source: <a href=\"https:\/\/images.idgesg.net\/images\/article\/2019\/12\/android-security-audit-app-permissions-100820863-large.jpg\" rel=\"nofollow\" target=\"_blank\">Computerworld<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>)<\/p>\n<p>\u00a0<\/p>\n<p>In your Android System Settings, select the \u201cApp permissions\u201d or \u201cPermissions manager\u201d option of the Apps &amp; Notifications section to get an overview of all the types of permissions you\u2019ve granted to apps on your device. To drill down to specifics, open the Apps &amp; Notifications section and click on the option to view All Apps. If you\u2019re worried about applications that are running in the background, tap the three dots at the top right to Show System apps.<\/p>\n<p>\u00a0<\/p>\n<p>You can then go through each app\u2019s individual permissions, and revoke any that look suspicious or unnecessary. Note that this may not be possible with certain system apps which are baked into your device, and protected by the operating system.<\/p>\n<p>\u00a0<\/p>\n<h2>Use The Android Scanning Facility<\/h2>\n<p>\u00a0<\/p>\n<p>With the Play Protect facility, Google has given its Android devices access to an online file-scanning and malware detection platform, that doesn\u2019t require the installation of additional software. On most newer Android versions, this system is enabled by default.<\/p>\n<p>\u00a0<\/p>\n<p>If you\u2019re not sure whether this is the case, open the Play Store app and visit the My Apps section to review your personal settings, or go to the Security section of your phone\u2019s system settings. Tap the gear icon in the upper right corner of the screen to display the line labeled \u201cGoogle Play Protect,\u201d and check the option to \u201cScan device for security threats.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6980\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo.jpg\" alt=\"\" width=\"1200\" height=\"1232\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo.jpg 1200w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo-292x300.jpg 292w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo-997x1024.jpg 997w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/06\/3rd-photo-768x788.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><\/a><\/p>\n<p>(Image source: <a href=\"https:\/\/images.idgesg.net\/images\/article\/2019\/12\/android-security-audit-play-protect-100820868-large.jpg\" rel=\"nofollow\" target=\"_blank\">Computerworld<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>)<\/p>\n<p>\u00a0<\/p>\n<p>This will enable Android\u2019s app verification system to keep an eye on all the apps on your device \u2013 both on first installation, and after they\u2019re installed.<\/p>\n<p>\u00a0<\/p>\n<h2>Use Best Practices For Application Downloads And Installation<\/h2>\n<p>\u00a0<\/p>\n<p>Speaking of installation, it\u2019s always best to restrict your downloads to apps that originate directly from the Play Store. If your Android device was issued to you by your employer, you may have limited control over the applications that are allowed on your device.<\/p>\n<p>\u00a0<\/p>\n<p>If you do get a choice of additional apps, exercise due diligence before you download and install. Read the entire list of permissions that the app is requesting, and decide for yourself whether they\u2019re reasonable. Read the app\u2019s reviews and ratings, and the number of times it has been downloaded. The Play Store now features the top favorable and critical reviews of each app, so you can get a more balanced view. Click the name of the developer, to check out the other apps they\u2019ve created, and how those are being reviewed.<\/p>\n<p>\u00a0<\/p>\n<h2>Control How Your Apps Are Tracking You<\/h2>\n<p>\u00a0<\/p>\n<p>Among the permissions you give to Android apps, there\u2019ll usually be a number of conditions relating to how the software and its developers can monitor, use, or distribute any personal information you enter into the app, and data that\u2019s generated during its use. You can exercise a degree of control over this data usage by configuring each app\u2019s permissions.<\/p>\n<p>\u00a0<\/p>\n<p>There are other settings on your device that you can use to regulate the ability of apps to trace your whereabouts or track how you\u2019re using the software. Revoking location access in the app settings is one of the main options you have available. If your device is running Android 10, you have the option to only allow an app access to location data when you\u2019re actively using it.<\/p>\n<p>\u00a0<\/p>\n<p>Using a data-limiting incognito or private mode with your phone\u2019s web browser will help limit the trail that you leave online, with the app forgetting the pages you visit and the keywords you search as soon as you close the browser window. It\u2019s also a good idea to regularly purge your browsing history.<\/p>\n<p>\u00a0<\/p>\n<p>For overall device protection online, you may also consider using a Virtual Private Network (VPN) app or service, which will encrypt all of your sessions, and usually have options for masking your location. Note that not all mobile VPN apps were created equal, so you should do some diligent research and shopping around before you commit.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Keep these recommendations in mind, and you\u2019ll be able to regularly monitor your application usage and app tracking behavior, for better management and security of your Android device.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping track of application usage and the installation of software on your Android phone or tablet is an essential activity, both for device management and your overall security. In this regard, it\u2019s also advisable to monitor how your Android applications are tracking you, in terms of your physical location, activities on the local device, and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6798,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-6977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6977"}],"version-history":[{"count":2,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6977\/revisions"}],"predecessor-version":[{"id":6982,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6977\/revisions\/6982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6798"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}