xeonnt, From what I rummaged through the competition - if the prog climbs into a keyboard interception - the market immediately yells.
In fact, in one of the competitors there is a very elegant solution.
Why do I need to intercept Claudia? In fact - just catch the conversation. And it made an alternative method, which also allows you to capture all kinds of vaybery-telegram even without root: Just do enough frequent screenshots of activity when given a list of applications. Or you can write all the video (but this not recommended because the large amount of turns). But try for yourself I can say - even the screenshots every 15 seconds, give a full conversation, well, except that except for the moments when the other party sends something long, it does not slow the user shakes. And without root ...
Yes, this method has drawbacks - in the same vibera, the possibility of screenshots in private chats is blocked and, accordingly, the program also cannot smash private chats. But not everyone uses private chat rooms.
From my point of view, the best way to make a "light version" that would be able to:
1. Write calls (phone).
2. Write environment.
3. Make screenshots.
4. Take a photo when unlock and possibly a periodic photo.
5. Write coordinates.
Everything. The lion’s share of users no longer need anything. Even the interception of SMS is better not to do. For by SMS, there are a lot of “safety confirmations” and for Google it is a “red rag”.
It may also be advisable to make a program in the form of 3 modules:
1. Data acquisition module (a program for recording everything).
2. Service support service (which monitors the operation of the collection module, manages tasks on a schedule, etc.)
3. Data service.
Exactly 3 separate applications. In one of the competitors, 2 modules were made (1 and 3 combined). You put the main and immediately after installation, he offers to put another prog.
Such a "weakling" from my point of view will give the following advantages:
1. None of the modules have “right at once a heap of rights, which he writes, and he climbs into the Internet”. Software that only writes calls or makes screenshots (without transferring anywhere) should not cause a particularly violent reaction of the market. As well as just a prog, which climbs on the Internet and reads the disk, too, does not seem to be very exciting (90% of different toys on the Internet)
2. Battery consumption for "active actions" (sound recording, shooting, etc.) and "data transfer" (these are the most energy-intensive processes as I understand it) will be spread over 2 applications. So they won't be right in the eyes of the battery.
Well, in order for this bunch of applications not to be called "fonila names" - it seems to me that you just need to compile the list of "standard applications" from users or the Internet directly by phone models (or at least by manufacturers) and make "choose the target phone model" when downloading. And applications would be downloaded with icons and names similar to the disgrace with regular software.
A separate topic I want to say about protection applications. I do not know exactly how the terms of the code is implemented, but in one of the competitors made the mechanism is as follows: you expose an application manager device. In the settings (via the website) you put daw "from turning off of the administrators." In the settings you stick "to select the administrator" and the phone just takes off from the settings in the main screen. In the meantime, there are the rights of the administrator - in the settings from the program simply does not have the button "delete". Acc ordinary users to remove it is practically impossible without a complete reset the phone. I do not know whether it will be able to bang the market in such hands (he ignore this program at all).