this post was submitted on 28 Jun 2024
11 points (82.4% liked)
Privacy
4016 readers
2 users here now
A community for Lemmy users interested in privacy
Rules:
- Be civil
- No spam posting
- Keep posts on-topic
- No trolling
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I agree. To your last point, I think you need to add more nuance. Lots of apps can take pics and thus require access same as mic. It’s not always a red flag until it is, which naturally should bring you back to a threat model you are comfortable with when analyzing whether permissions are valid