Abstract:
Disclosed are methods, computing devices, and computer-readable mediums for transferring privacy settings. For example, a method includes determining location information indicative of a location of a computing device. Further, the method includes determining one or more applications installed on the computing device and on one or more other computing devices that are configured to access the location information. Yet further, the method includes transferring a privacy setting of the computing device to the one or more other computing devices. In addition, the method includes determining accesses of the one or more applications to the location information indicative of the location of the computing device.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
Disclosed are methods, computing devices, and computer-readable mediums for transferring privacy settings. For example, a method includes determining location information indicative of a location of a computing device. Further, the method includes determining one or more applications installed on the computing device and on one or more other computing devices that are configured to access the location information. Yet further, the method includes transferring a privacy setting of the computing device to the one or more other computing devices. In addition, the method includes determining accesses of the one or more applications to the location information indicative of the location of the computing device.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.