Office, Karriere und IT Blog

Office, Karriere und IT Blog

   
Anzeige

How to restrict WhatsApp permissions

What used to be the SMS is done today via messenger over the mobile Internet.
And the success of messenger services was ultimately a logical consequence, since not every message costs a few cents, which lapp themselves quickly over time to a few euros!

The data volumes to be transmitted are also kept within limits (at least as long as primarily text is being sent), so that the volume of data is only used insignificantly. Now it is so that unfortunately there is nothing really free in life. The price you pay for WhatsApp, for example, is significantly more valuable to the company than the quick money.

How to restrict WhatsApp permissions

Topic Overview

Anzeige

It’s about your data!

And not just those that you specified during the installation, but all data (such as photos, contacts, appointments and documents) that are on your smartphone.
At the latest since the acquisition of WhatsApp by Facebook, the path of precisely this data is no longer comprehensible to the user.

Of course, there are also alternatives to WhatsApp, but since they do not have this high prevalence, they are unfortunately hardly used, although they offer an end to end encryption, without compromising the comfort appreciably.

You can find out how to control and restrict the rights of WhatsApp and other apps on your smartphone in our article.

How to restrict WhatsApp permissions

What used to be the SMS is done today via messenger over the mobile Internet.
And the success of messenger services was ultimately a logical consequence, since not every message costs a few cents, which lapp themselves quickly over time to a few euros!

The data volumes to be transmitted are also kept within limits (at least as long as primarily text is being sent), so that the volume of data is only used insignificantly. Now it is so that unfortunately there is nothing really free in life. The price you pay for WhatsApp, for example, is significantly more valuable to the company than the quick money.

How to restrict WhatsApp permissions

Topic Overview

Anzeige

It’s about your data!

And not just those that you specified during the installation, but all data (such as photos, contacts, appointments and documents) that are on your smartphone.
At the latest since the acquisition of WhatsApp by Facebook, the path of precisely this data is no longer comprehensible to the user.

Of course, there are also alternatives to WhatsApp, but since they do not have this high prevalence, they are unfortunately hardly used, although they offer an end to end encryption, without compromising the comfort appreciably.

You can find out how to control and restrict the rights of WhatsApp and other apps on your smartphone in our article.

1. Check WhatsApp permissions.

1. Check WhatsApp permissions.

As of Android version 6.0, you can now finally control the permissions of apps with on-board resources, and not only see them once during the installation.

To view and control the permissions of applications, first call the application manager:

Settings” – “Applications” – “Application Manager“.

There you will find all installed apps that you can now select separately. In the submenu of the respective app, the most important data (such as energy consumption, data usage, etc.) is displayed.

Here you select the item “Permissions”, and you can activate or deactivate these.

See picture: (click to enlarge)

Android application settings
Check WhatsApp permissions

Of course, you have the option to turn on or off all permissions as you like, but you may have to reckon with a reduced range of functions right through to inability to function.

Here we simply recommend to check the permissions according to the exclusion principle, and then simply undo the steps.

As of Android version 6.0, you can now finally control the permissions of apps with on-board resources, and not only see them once during the installation.

To view and control the permissions of applications, first call the application manager:

Settings” – “Applications” – “Application Manager“.

There you will find all installed apps that you can now select separately. In the submenu of the respective app, the most important data (such as energy consumption, data usage, etc.) is displayed.

Here you select the item “Permissions”, and you can activate or deactivate these.

See picture:

Android application settings
Check WhatsApp permissions

Of course, you have the option to turn on or off all permissions as you like, but you may have to reckon with a reduced range of functions right through to inability to function.

Here we simply recommend to check the permissions according to the exclusion principle, and then simply undo the steps.

2. Alternatives to WhatsApp.

2. Alternatives to WhatsApp.

WhatsApp is of course a very good messenger, and not least because of its accessibility market leader in this field.

However, he also has to be criticized for the difficulty of reproducing and controllable handling of users’ personal data.

There are alternatives that make it better:

Threema:
Represents a safe alternative to WhatsApp and is aimed primarily at users attach importance to the protection of your personal information.

After the initial installation, set a key pair for decoding and decoding the Incoming and outgoing messages, and register once by e-mail address or phone number. For a detailed description of the range of functions and the encryption technologies, see the manufacturer’s FAQ: Click here

Here you can download the Threema Messenger for Android: Threema Download

Ads

Telegram:
Basically a WhatsApp clone with almost identical functionality. Visually, the messenger reminds strongly of the top dog. Your contacts are also conveniently taken from the address book here.

When it comes to security, telegrams can score with a 256-bit encryption, but they clearly lag behind Threema in terms of data protection.

A detailed FAQ can be found on the manufacturer page: Click here

Here you can download the Telegram Messenger for Android: Telegram Download

Blogverzeichnis Bloggerei.de

WhatsApp is of course a very good messenger, and not least because of its accessibility market leader in this field.

However, he also has to be criticized for the difficulty of reproducing and controllable handling of users’ personal data.

There are alternatives that make it better:

Threema:
Represents a safe alternative to WhatsApp and is aimed primarily at users attach importance to the protection of your personal information.

After the initial installation, set a key pair for decoding and decoding the Incoming and outgoing messages, and register once by e-mail address or phone number. For a detailed description of the range of functions and the encryption technologies, see the manufacturer’s FAQ: Click here

Here you can download the Threema Messenger for Android: Threema Download

Ads

Telegram:
Basically a WhatsApp clone with almost identical functionality. Visually, the messenger reminds strongly of the top dog. Your contacts are also conveniently taken from the address book here.

When it comes to security, telegrams can score with a 256-bit encryption, but they clearly lag behind Threema in terms of data protection.

A detailed FAQ can be found on the manufacturer page: Click here

Here you can download the Telegram Messenger for Android: Telegram Download

Blogverzeichnis Bloggerei.de

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Popular Posts:

911, 2025

Microsoft Loop in Teams: The revolution of your notes?

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , , |

What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.

911, 2025

Career booster 2026: These Microsoft Office skills will take you further!

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , |

A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.

311, 2025

Why Zero Trust doesn’t work without identity protection!

November 3rd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.

211, 2025

How AI fuels cyberattacks – and how it protects us from them

November 2nd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.

211, 2025

Information overload: Protection & tips against digital stress

November 2nd, 2025|Categories: Shorts & Tutorials, Homeoffice|Tags: |

Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.

111, 2025

Put an end to password chaos: Why a password manager is important

November 1st, 2025|Categories: Shorts & Tutorials, Data Protection, Google, Homeoffice, Software|Tags: , , , |

Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".

Offers 2024: Word & Excel Templates

Popular Posts:

911, 2025

Microsoft Loop in Teams: The revolution of your notes?

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , , |

What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.

911, 2025

Career booster 2026: These Microsoft Office skills will take you further!

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , |

A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.

311, 2025

Why Zero Trust doesn’t work without identity protection!

November 3rd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.

211, 2025

How AI fuels cyberattacks – and how it protects us from them

November 2nd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.

211, 2025

Information overload: Protection & tips against digital stress

November 2nd, 2025|Categories: Shorts & Tutorials, Homeoffice|Tags: |

Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.

111, 2025

Put an end to password chaos: Why a password manager is important

November 1st, 2025|Categories: Shorts & Tutorials, Data Protection, Google, Homeoffice, Software|Tags: , , , |

Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".

Offers 2024: Word & Excel Templates

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top