This basic principle must be used throughout all parts: Through the permissions users grant on their own equipment to These permissions your app receives from backend providers. So, everytime you commit to down load and operate untrusted code, make sure you entirely recognize what it does. Your WiFi network identify https://blackanalytica.com/index.php#services