The following sections in this paper will be as follows; Section 2 provides an introduction and overview of medical applications interception techniques of the ten popular android medical applications and experimental results are discussed in section 3. In addition, the findings will be discussed in section 4 and section 5 and 6 provide a discussion and conclusion. Our research will be slightly different from the base paper [1], [3], because our research on medical applications doesn’t have any voice service, thus some of figures below will be different from the base paper and experiment setup. Besides that, there is not any entropy because it is commonly used for the voice and to identify whether it is encrypted or not