Anzeige


Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

How to restrict WhatsApp permissions

What used to be the SMS is done today via messenger over the mobile Internet.
And the success of messenger services was ultimately a logical consequence, since not every message costs a few cents, which lapp themselves quickly over time to a few euros!

The data volumes to be transmitted are also kept within limits (at least as long as primarily text is being sent), so that the volume of data is only used insignificantly. Now it is so that unfortunately there is nothing really free in life. The price you pay for WhatsApp, for example, is significantly more valuable to the company than the quick money.

How to restrict WhatsApp permissions

Topic Overview

Anzeige

It’s about your data!

And not just those that you specified during the installation, but all data (such as photos, contacts, appointments and documents) that are on your smartphone.
At the latest since the acquisition of WhatsApp by Facebook, the path of precisely this data is no longer comprehensible to the user.

Of course, there are also alternatives to WhatsApp, but since they do not have this high prevalence, they are unfortunately hardly used, although they offer an end to end encryption, without compromising the comfort appreciably.

You can find out how to control and restrict the rights of WhatsApp and other apps on your smartphone in our article.

How to restrict WhatsApp permissions

What used to be the SMS is done today via messenger over the mobile Internet.
And the success of messenger services was ultimately a logical consequence, since not every message costs a few cents, which lapp themselves quickly over time to a few euros!

The data volumes to be transmitted are also kept within limits (at least as long as primarily text is being sent), so that the volume of data is only used insignificantly. Now it is so that unfortunately there is nothing really free in life. The price you pay for WhatsApp, for example, is significantly more valuable to the company than the quick money.

How to restrict WhatsApp permissions

Topic Overview

Anzeige

It’s about your data!

And not just those that you specified during the installation, but all data (such as photos, contacts, appointments and documents) that are on your smartphone.
At the latest since the acquisition of WhatsApp by Facebook, the path of precisely this data is no longer comprehensible to the user.

Of course, there are also alternatives to WhatsApp, but since they do not have this high prevalence, they are unfortunately hardly used, although they offer an end to end encryption, without compromising the comfort appreciably.

You can find out how to control and restrict the rights of WhatsApp and other apps on your smartphone in our article.

1. Check WhatsApp permissions.

1. Check WhatsApp permissions.

As of Android version 6.0, you can now finally control the permissions of apps with on-board resources, and not only see them once during the installation.

To view and control the permissions of applications, first call the application manager:

Settings” – “Applications” – “Application Manager“.

There you will find all installed apps that you can now select separately. In the submenu of the respective app, the most important data (such as energy consumption, data usage, etc.) is displayed.

Here you select the item “Permissions”, and you can activate or deactivate these.

See picture: (click to enlarge)

Android application settings
Check WhatsApp permissions

Of course, you have the option to turn on or off all permissions as you like, but you may have to reckon with a reduced range of functions right through to inability to function.

Here we simply recommend to check the permissions according to the exclusion principle, and then simply undo the steps.

As of Android version 6.0, you can now finally control the permissions of apps with on-board resources, and not only see them once during the installation.

To view and control the permissions of applications, first call the application manager:

Settings” – “Applications” – “Application Manager“.

There you will find all installed apps that you can now select separately. In the submenu of the respective app, the most important data (such as energy consumption, data usage, etc.) is displayed.

Here you select the item “Permissions”, and you can activate or deactivate these.

See picture:

Android application settings
Check WhatsApp permissions

Of course, you have the option to turn on or off all permissions as you like, but you may have to reckon with a reduced range of functions right through to inability to function.

Here we simply recommend to check the permissions according to the exclusion principle, and then simply undo the steps.

2. Alternatives to WhatsApp.

2. Alternatives to WhatsApp.

WhatsApp is of course a very good messenger, and not least because of its accessibility market leader in this field.

However, he also has to be criticized for the difficulty of reproducing and controllable handling of users’ personal data.

There are alternatives that make it better:

Threema:
Represents a safe alternative to WhatsApp and is aimed primarily at users attach importance to the protection of your personal information.

After the initial installation, set a key pair for decoding and decoding the Incoming and outgoing messages, and register once by e-mail address or phone number. For a detailed description of the range of functions and the encryption technologies, see the manufacturer’s FAQ: Click here

Here you can download the Threema Messenger for Android: Threema Download

Ads

Telegram:
Basically a WhatsApp clone with almost identical functionality. Visually, the messenger reminds strongly of the top dog. Your contacts are also conveniently taken from the address book here.

When it comes to security, telegrams can score with a 256-bit encryption, but they clearly lag behind Threema in terms of data protection.

A detailed FAQ can be found on the manufacturer page: Click here

Here you can download the Telegram Messenger for Android: Telegram Download

Blogverzeichnis Bloggerei.de

WhatsApp is of course a very good messenger, and not least because of its accessibility market leader in this field.

However, he also has to be criticized for the difficulty of reproducing and controllable handling of users’ personal data.

There are alternatives that make it better:

Threema:
Represents a safe alternative to WhatsApp and is aimed primarily at users attach importance to the protection of your personal information.

After the initial installation, set a key pair for decoding and decoding the Incoming and outgoing messages, and register once by e-mail address or phone number. For a detailed description of the range of functions and the encryption technologies, see the manufacturer’s FAQ: Click here

Here you can download the Threema Messenger for Android: Threema Download

Ads

Telegram:
Basically a WhatsApp clone with almost identical functionality. Visually, the messenger reminds strongly of the top dog. Your contacts are also conveniently taken from the address book here.

When it comes to security, telegrams can score with a 256-bit encryption, but they clearly lag behind Threema in terms of data protection.

A detailed FAQ can be found on the manufacturer page: Click here

Here you can download the Telegram Messenger for Android: Telegram Download

Blogverzeichnis Bloggerei.de

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

Search by category:

Popular Posts:

2312, 2025

Ad-free home network: Install Pi-hole on Windows

December 23rd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

Say goodbye to ads on smart TVs and in apps: Pi-hole software turns your Windows laptop into a network filter. This article explains step-by-step how to install it via Docker and configure the necessary DNS settings in your FRITZ!Box.

2212, 2025

How to tune your FRITZ!Box into a professional call server

December 22nd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

A professional telephone system can be built using a FRITZ!Box and a laptop. This article shows step by step how to use the free software "Phoner" to schedule announcements and record calls – including important legal information (§ 201 StGB).

2112, 2025

Why to-do lists are a waste of time

December 21st, 2025|Categories: Shorts & Tutorials, Career, Homeoffice|Tags: , |

Do you feel unproductive at the end of the day, even though you've worked hard? Your to-do list is to blame. It tempts you to focus on easy tasks and ignores your limited time. This article explains why lists are "self-deception" and why professionals use a calendar instead.

1812, 2025

Smartphone Wi-Fi security: Public hotspots vs. home network

December 18th, 2025|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Software|Tags: , , |

Is smartphone Wi-Fi a security risk? This article analyzes in detail threats such as evil twin attacks and explains protective measures for when you're on the go. We also clarify why home Wi-Fi is usually secure and how you can effectively separate your smart home from sensitive data using a guest network.

2411, 2025

Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!

November 24th, 2025|Categories: Shorts & Tutorials, Artificial intelligence, Microsoft Excel, Microsoft Office, Software|Tags: , |

Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.

1611, 2025

Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen

November 16th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice|Tags: , |

Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.

Offers 2024: Word & Excel Templates

Popular Posts:

2312, 2025

Ad-free home network: Install Pi-hole on Windows

December 23rd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

Say goodbye to ads on smart TVs and in apps: Pi-hole software turns your Windows laptop into a network filter. This article explains step-by-step how to install it via Docker and configure the necessary DNS settings in your FRITZ!Box.

2212, 2025

How to tune your FRITZ!Box into a professional call server

December 22nd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

A professional telephone system can be built using a FRITZ!Box and a laptop. This article shows step by step how to use the free software "Phoner" to schedule announcements and record calls – including important legal information (§ 201 StGB).

2112, 2025

Why to-do lists are a waste of time

December 21st, 2025|Categories: Shorts & Tutorials, Career, Homeoffice|Tags: , |

Do you feel unproductive at the end of the day, even though you've worked hard? Your to-do list is to blame. It tempts you to focus on easy tasks and ignores your limited time. This article explains why lists are "self-deception" and why professionals use a calendar instead.

1812, 2025

Smartphone Wi-Fi security: Public hotspots vs. home network

December 18th, 2025|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Software|Tags: , , |

Is smartphone Wi-Fi a security risk? This article analyzes in detail threats such as evil twin attacks and explains protective measures for when you're on the go. We also clarify why home Wi-Fi is usually secure and how you can effectively separate your smart home from sensitive data using a guest network.

2411, 2025

Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!

November 24th, 2025|Categories: Shorts & Tutorials, Artificial intelligence, Microsoft Excel, Microsoft Office, Software|Tags: , |

Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.

1611, 2025

Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen

November 16th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice|Tags: , |

Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.

Offers 2024: Word & Excel Templates

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top