What your child will learn
Explain what app permissions are and why apps request them
Evaluate whether a permission request matches the app's stated function
Apply the principle of least privilege: deny permissions that exceed what the app needs
Identify red-flag permission requests that suggest data harvesting
How this mission works
Put on your detective hat and evaluate four real-world app permission requests: a flashlight app requesting contacts, a map app asking for location, a game requesting microphone access, and a calculator that wants your camera. Grades 3-5 students learn to match each permission to the app's purpose and deny the ones that don't fit.
What students actually encounter
A flashlight app asks for your contacts. Does a flashlight need your contacts?
A calculator asks for camera access. Is that normal?
Cipher is with them the whole way
When a student gets stuck on The App Permission Detective, Cipher appears with a mission-specific nudge — no spoilers, just a hint toward the right thinking. Make a wrong choice, and Cipher explains the real-world consequence. Finish the mission, and Cipher generates a personalized performance debrief based on exactly how the student played it.
ISTE alignment
Students engage in safe behaviors by evaluating app permission requests against the principle of least privilege, and manage personal data by denying access that exceeds an app's stated function.