If application A tries to do something malicious like read application B's data or dial the phone without permission (a separate application), then the Operating System protects against this, because application A does not have the appropriate user privileges.