Thursday, February 25, 02:32
Home how To iPhone: How to see which apps have access to your contacts

iPhone: How to see which apps have access to your contacts

Some iPhone privacy issues go deeper than accessing your contacts list, which exposes your contacts to a third party, which can then compare the list with its files or possibly share it with others. See how you can see which applications have access to your contacts and how to grant or revoke access.


To get started, open "Settings" on your iPhone.

In "Settings", click "Privacy".


In "Privacy", click "Contacts".

Next, you will see a list of each installed application who has requested access to your contacts in the past. Next to each one, you will see one button which is either activated either off. If the button is set to "On", the application may have access in your contacts. If disabled, the application does not have access to your contacts.


At any time, you can concede or revoke access to your contacts per application, by pressing the button next to each application in the list.


Note that even if you grant an application access to your contacts from this list, the application may not automatically receive this change in Settings. In this case, you may have to restart of your application.

If you revoke access to an application using this application mode, the application will no longer have access to your contacts. However, the application may have already uploaded your contact list to servers so this aspect of your privacy remains in the hands of the company that runs the application. If you really need to remove access to your contacts, you may be able to do so in the app itself, communicating with the company running the application or looking for account management settings on services such as Facebook. Good luck!

Source of information:


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


Huawei: Wearables are becoming available for other applications

While the dispute between Huawei and the USA continues unabated, the company seems to be doing quite well in the field of ...

How to create a Progress Bar in Microsoft PowerPoint

A progress bar is a graphic that, in PowerPoint, visually represents the percentage of presentation slides that have been completed. See ...

EU: AI makes autonomous vehicles "extremely vulnerable" to cyber attacks

The goal of autonomous vehicles is to be able to avoid human error and save lives, but a new report of ...

Security officials to Senate to invade Capitol: "It was a coordinated attack"

Security officials testified Tuesday that they believe the January 6 riot at the Capitol was a "coordinated attack" as they were pressured by senators ...

Universal Android Debloater: Get rid of unwanted applications Οι προεγκατεστημένες εφαρμογές, γνωστές και ως "bloatware", είναι συνηθισμένη πρακτική των κατασκευαστών συσκευών για να ωθούν...

One UI 3.1: Samsung DeX gets wireless support!

A few weeks ago, it was discovered that the Galaxy S1 series was equipped with wireless support for DeX on PC. As it turns out, you can ...

Google Password Checkup feature is coming to Android

Android users can now take advantage of the Password Checkup feature that Google first introduced in the browser ...

The World Wide Web may be coming to an end. Where does this come from?

In recent years, the World Wide Web has begun to look less "global". Developments in the field of technology and the Internet, ...

United Kingdom: Organizations related to critical infrastructure have been breached

A new study by Bridewell Consulting showed that the vast majority (86%) of organizations managing critical national infrastructure in the UK ...

Honda wants to put a drone in the tail of an electric motorcycle

Well, this is definitely one of the strangest news that has been released lately: Honda wants to put a mini ...