The purpose of a permission is to protect the privacy of an Android user.
According to Android documentation for app developers, permissions fall into two groups – normal and dangerous.
- Normal permissions – Don’t pose risk to the user’s privacy and are granted automatically by the system to the app.
- Dangerous permissions – Could potentially affect user’s privacy or the device’s normal operation, the user must explicitly agree to grant those permissions.
As a VPN user, you want your VPN to not ask any kind of dangerous permissions that are not needed for the VPN app to function or which can compromise your privacy.
In this study, 81 Android VPN apps were evaluated based upon the permissions that they request.
Our goal was to find out the most commonly used permissions by the VPN apps as well as the questionable and more suspicious permissions that are either not needed for the VPN app to work or are violating the user’s privacy or security.
All of the tested apps were downloaded from the Google Play store and the permissions lists were extracted directly from the app’s .apk file. Here’s a more detailed Google spreadsheet with all the permissions from the tested Android VPN apps.
Most Commonly Asked Permissions By VPNs
Android has a variety of different permissions for different purposes. Depending on what an app wants to do and how it does it, it may need a different set of permissions. Table 1 shows the most common permissions requested by the VPN apps in this study.
Table 1. Most commonly requested permissions for Android VPN apps.
- Green: Normal – permissions granted automatically by the Android system.
- Red: Dangerous – permissions that compromise user’s privacy or system (user must agree).
Allows VPN applications to open network sockets.
Allows VPN applications to access information about networks.
For keeping device awake.
To notify if device restart is completed.
Allows VPN applications to access information about Wi-Fi networks.
For in-app billing purposes.
Gives the VPN developers information on how the users arrived to the app before installing.
Allows VPN to write to external storage, such as SD.
Allows VPN to read from external storage, such as SD.
For keeping the VPN application running.
Allows read only access to phone state, including the phone number of the device, current cellular network information and the status of any ongoing calls.
Allows the API to use WiFi or mobile cell data (or both) to determine the device’s location.
Allows VPN applications to change Wi-Fi connectivity state.
Allows VPN app to access users precise location.
Some permissions, such as android.permission.INTERNET and android.permission.ACCESS_NETWORK_STATE was granted to all of the VPN apps automatically.
However, in this list, there were also “dangerous” permissions that could potentially compromise Android user privacy, these were related to getting access to your precise location, device name, your phone number and reading your SD card.
Reply from Alex (Seed 4 Me VPN):android.permission.ACCESS_FINE_LOCATION
The location permission required to get name of Wi-Fi networks. In our application we have a “Trusted Networks” feature. The application notifies users when they are connected to a new Wi-Fi network and if the network is not in the list of Trusted Networks then the app advises user to use the VPN. It’s a useful feature for privacy protection, especially when you are connected to a free Wi-Fi in a hotel or cafe.
Android operating system requires the permission since Android 9, previous versions of our application didn’t require the permission. The application asks for the permission at the start screen and has the message explaining why it requires the permission. If user does not want to use “Trusted Networks” feature, then he can either don’t give the access on the starting screen or later disable the access to our application to this feature in system settings (Settings > Apps & Notifications > Seed4.Me VPN > Permissions > Location). All other features of the application will work just fine.
The permissions to read and write from external storage required to collect error log. We have 24/7 support and if application does not work as expected then users can collect logs for tech. support by long press on “Support” button. The application will ask if the user wants to enable log collection and if user agrees then application will save its log to external drive. User can reproduce the issue and press “Support” button again to send an email to our support team. The log will be automatically attached to the email and removed from external storage.The application does not request the permissions until the user wants to collect the logs. By default the permission is Disabled for the application and other features of the application does not require them. If user collected logs once then he can disable access in settings (Settings > Apps & Notifications > Seed4.Me VPN > Permissions > Storage).
A Look Into “Dangerous” Permissions
Once we had identified all the permissions of each 81 VPNs (including the common ones), we filtered out permissions that were not needed for a VPN app to function and can potentially harm the user’s privacy.
Many of the VPN apps reviewed in this study ask for permissions that are not needed for a VPN to function.
Some permissions are fairly harmless. Like the ability to cause the phone to vibrate or push app notifications.
However others are more suspicious. While these permissions can be used for benign purposes (i.e. requesting access to coare location is a way to get the name of a WiFi network for handling reconnections), they also have the ability to compromise the user’s privacy.
Others have no legitimate purpose in a VPN app, like WRITE_SETTINGS which allows VPN app to write the system settings or READ_LOGS, which allows VPN app to read the low-level system log files.
Table 2. Apps with most suspicious/dangerous permissions
|VPN Name||# of dangerous permission||Exact permission name|
|Hola Free VPN||4||android.permission.READ_PHONE_STATE
Another notable permission used by oVPNSpider and tigerVPN is the READ_LOGS permission. This permission is no longer available to third-party apps (like VPNs) due to privacy concerns, and the app should not be requesting it at all.
Below are explanations of suspicious permissions asked by Android VPN apps:
1. WRITE_EXTERNAL_STORAGE and READ_EXTERNAL_STORAGE
Allows VPN to read and write to external storage – not needed for a VPN app to function and could compromise user’s privacy.
- Permission: android.permission.WRITE_EXTERNAL_STORAGE and READ_EXTERNAL_STORAGE
- Used by the following 27 VPN apps: Betternet, Free VPN org, OneVPN, X-VPN, StarVPN, VPN One Click, Yoga VPN, AppVPN, ProXPN, Seed4me VPN, oVPNSpider, Goose VPN, SpyOFF, TouchVPN, SwitchVPN, Trust Zone, McAfee VPN, SurfEasy, Psiphon, TigerVPN, Dash VPN, Hotspot Shield, NordVPN, Hola VPN, SurfShark, VPN Secure, Zoog VPN.
Allows VPN read only access to phone state, including the phone number of the device, current cellular network information and the status of any ongoing calls – not needed for a VPN to work.
- Permission: android.permission.READ_PHONE_STATE
- Used by the following Android 18 VPN apps: Avira VPN, Free VPN org, Norton Secure VPN, VPN One Click, Yoga VPN, HideMyAss, AVG VPN, ProXPN, Goose VPN, Touch VPN, McAfee VPN, SurfEasy, Kaspersky VPN, Speedify, Dash VPN, Hotspot Shield, ibVPN, Hola VPN.
Allows VPN to use WiFi or mobile cell data (or both) to determine the device’s location – potential privacy risk.
- Permission: android.permission.ACCESS_COARSE_LOCATION
- Used by the following 16 VPN apps: WindScribe, Free VPN org, Yoga VPN, HideMyAss, Avast VPN, AVG VPN, iVPN, ProXPN, oVPNSpider, TouchVPN, SwitchVPN, Kaspersky VPN, Psiphon VPN, Speedify, Dash VPN, Zoog VPN .
Allows a VPN app to access user’s precise location – high privacy risk.
- Permission: android.permission.ACCESS_FINE_LOCATION
- Used by the following 9 VPN apps: Yoga VPN, VPN Unlimited, ProXPN, Seed4me VPN, oVPNSpider, SwitchVPN, Dash VPN, Hola VPN, Zoog VPN
Allows VPN app to to read or write the system settings – high security and privacy risk.
- Permission: android.permission.WRITE_SETTINGS
- Used by the following 3 VPN apps: Speedify and Yoga VPN.
Allows VPN app to read the low-level system log files. Not for use by third-party applications, because Log entries can contain the user’s private information – high privacy risk.
- Permission: android.permission.READ_LOGS
- Used by the following 2 VPN apps: TigerVPN, oVPNSpider.
Allows VPN application to manage access to documents, usually as part of a document picker. This permission should only be requested by the platform document management app. This permission cannot be granted to third-party apps.
- Permission: android.permission.MANAGE_DOCUMENTS
- Used by TigerVPN
Allows an application to retrieve state dump information from system services. Not for use by third-party applications.
- Permission: android.permission.DUMP
- Used by PureVPN
In the last table, we are listing out all the VPNs we tested and their permissions in total, custom permissions and suspicious permissions.
Table 3. VPN apps ranked by requested permissions
|VPN name||.apk file name||Suspicious Permissions||Total Permissions||Custom Permissions|
|Seed 4 Me||me.seed4.app.android||4||17||4|
|Free VPN org||org.freevpn||3||12||2|
|VPN One Click||com.vpnoneclick.android||3||7||0|
|Hotspot Shield VPN||hotspotshield.android.vpn||3||16||3|
|Mcafee Safe Connect||com.mcafee.safeconnect.android||2||10||2|
|Avira Phantom VPN||com.avira.vpn.AviraVPNApplication||1||13||1|
|Norton Secure VPN||com.symantec.securewifi||1||13||3|
|VPN In Touch||com.vpnintouch.android||1||9||2|
|Hide My IP||com.hidemyip.hideme||1||10||1|
|Private Internet Access||com.privateinternetaccess.android||1||5||0|
In theory, VPN apps should only need a few permissions to function. INTERNET and ACCESS_NETWORK_STATE should usually be enough.
However, as an average, 11 permissions are asked per VPN app.
Android provides a wide variety of possible permission for applications to take advantage of. However, there is also the potential for apps to define their own permissions as well. In many cases, these permissions are benign, like allowing an app to talk to the maker’s cloud systems (a commonly requested one for these apps).
Higher up the table are VPN apps that have the most dangerous permissions that could affect user’s privacy. Especially Yoga VPN, ProxPN and TigerVPN
However, the use of a large number of dangerous permissions could be cause for suspicion.
When selecting and installing a VPN app on Android, paying attention to permissions is important. Read the description and think about whether the app really needs the ability to record you in order to provide a VPN service. Some of the apps from the biggest companies turned out to be the most suspicious in this study, so you can’t just trust the big names.