This document discusses various ways that an Android application can access protected application programming interfaces (APIs) and permissions without explicitly declaring them in the app's manifest. It describes techniques like using Toast notifications to cause a denial of service crash in the system server and gain root access, as well as leveraging implicit broadcasts and custom URI schemes to enable capabilities without permissions. The document warns that these techniques allow apps to perform actions secretly without consent from the user.