Before the user grants this permission, the operating system shall ensure that the application cannot provide functions that depend on this permission. After the core sensitive permission is granted, the operating system can also appropriately add explicit real-time prompts to inform the user of the core sensitive permission in the process of using the core sensitive permission
正在翻译中..