Skip to main content

Privacy Policy

Your privacy and data security are extremely important to us. We are committed to the responsible management, protection, and use of your personal information. Before using the services or apps provided by Security Guard, please read carefully the following statements.
This Privacy Policy (the “Policy”) serves to explain what information Security Guard and its affiliates and subsidiaries (collectively, “we”, “us”, or “our”) collect, and how we use and protect your information when you use any mobile applications that we develop and are available for download in the Google Play Store.
This Privacy Policy applies to Security Guard websites and products and describes how Security Guard collects, uses, shares and secures your personal information. It also describes your choices regarding use, access and correction of your personal information.

How do we collect your information?

Directly

Some information you (or someone acting on your behalf) provide to us directly. For example, when you post comments, ask questions in our blog, fill out a user profile, apply for a job, or voluntarily decide to grant us remote access to provide you with technical support. Also, we may collect and store all posted forum and blog information and user profiles and make them available for public viewing.

  • Simply

        We collect your information when you give it to us or post in forums or blogs.

Cookies

Security Guard and its service providers collect information through "cookies" and other similar tracking technologies to analyze trends, administer the website, track users' movements around the website, and to gather demographic information about our user base as a whole. Cookies are text files saved by your browser when you log into our software or services. We may use both session cookies and persistent cookies to identify that you have logged in, to tell us how and when you interact with our software or services, and to check aggregate usage and web traffic. Unlike persistent cookies, session cookies are deleted when you log off and close your browser. If you prefer, you can always change your browser options to stop accepting cookies or to prompt you before accepting cookies. However, if you do not accept cookies you may not be able to access the entirety of our software and services.

  • Simply

        We also collect your information using "cookies" and other similar tracking technologies when you visit our website. You can prevent this method of information collection if you like.

What Information Do We Collect?

    1. Device Information

  • We collect your device and network connection information in order to provide you better experience when you use our app.

  • This information depends on the context of your interactions with us, the choices you make, including your privacy settings, and the products and features you use, and may include:

    • SDK/API/JS code version, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent deice identifier, the terminal manufacturer, the terminal device operating system version, the location of the language, the time zone and the network state (Wi-Fi and so on), the CPU, and the battery use, Screen resolution, Memory usage, Storage usage, sim operator, sim card country, Application release status in google play, Ad loading strategy, Ad platform and advertising placement id. Phone height and width,sim operator name,os version.

    • We store the information collected through the Android ID tied to the device you are using. In this way, we can retain your advertising behavior while you are using the app. We will treat this information as personal information

    2. Data about your use of the Services       

  • Number of clicks, landing pages, pages viewed and order of those pages, the amount of time spent on particular pages, the date and time of your request, number of the app opened and some viewed page.

  • Permissions status.

  • Whether the function is running normally, such as whether a virus is detected.

  • package name

  • first open time timestamp

  • firebase_device_id

  • Advertisers may store or read cookies

  • These data only be passed to the certified third-party statistical platform: Firebase.

  • The above information is only used to improve the product experience and will not be sold to any third parties. We will not use this information for purposes other than improving the product experience and ad performance.

    3. Monetization and Analytical Information from Other Sources

            Third-party SDKs integrated in our app may access your information, including:
      • Google Advertising ID

      • Data associated with your device (e.g. device type, technological information, country)

      • Data to do advertising, marketing and analysis

      • Advertisers may store or read cookies

The information collected by third-party SDKs is governed by the providers of these SDKs and we have no control over such third parties. The third-parties include monetization partners, such as Google Admob, Meta Audience Network, and also analytical tools partners, such as Firebase. The links to the above-mentioned platforms’ privacy policy are attached in the section “Third-party Privacy Policy”.

    4. Android Advertising ID

  • We use your Android advertising identifier in order to provide you with customized advertisement experience. It is used exclusively for advertising and analytics. Please note that the advertising identifier does not contain any user sensitive information that can be used to identify you as a user or your device. It is not connected to personally-identifiable information or associated with any persistent device identifier (for example: SSAID, MAC address, IMEI, etc.).

    

How do we use personal information?

We use personal information for the following business purposes: providing you with information, products or services; providing support to you and responding to your requests; correspondence with you about our products, services, events, or news; performing and enforcing any contract(s) between yourself and Mobile Security and Antivirus, including billing and collections; to improve our products and services, including malware research, as well as our websites and present content to you; as described to you when collecting your personal information or as otherwise allowed by applicable law.

We will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.

Other than with respect to the exceptions below, we do not share personal information with third parties

Sharing of information collected from our users depends on whether it is anonymous / non-personal, or personal.

Anonymous and/or non-personal information:

Our apps and websites use some services offered by Google and WordPress for analytical and advertising purposes (for example, Google Analytics, AdMob for Android, and JetPack Stats for WordPress).

So, we may share anonymous and/or non-personal information with these third parties and may publicly display aggregate or anonymous information (for example, concerning the main infections and malware detected during specific timeframes).

Personal information:

We don’t share personal information collected from our users to third parties. We may share your personal data only in these cases:

– when necessary to deliver the product or service you require such as with a payment card provider who we use to process your credit card transaction;
– when authorized by law or necessary to comply with a valid legal process;
– when required to protect and defend the rights or property of our legal entity, our products, our websites, or our services;
– when necessary to protect the personal safety, property or other rights of the public, our legal entity or customers;

  • Simply

        We use your information for providing you with our services. In certain situations, described below, we may share your personal information with a third party.


What Are The Important Permissions We Request?

Depending on the context of your interactions with us, we may ask you to provide certain permissions in order to let our app perform properly. You may choose to opt-out anytime, but please note that not giving us these permissions can result in malfunctioning of our app. The permissions we ask are listed below:

  • Storage

    • read the contents of your USB storage

    • modify or delete the contents of your USB storage

  • All files access

  • Location

    • approximate location (network-based)

    • precise location (GPS and network-based)

  • Device ID & call information

    • read phone status and identity

  • Wi-Fi connection information

    • view Wi-Fi connections

  • Photos/Media/Files

    • read the contents of your USB storage

    • modify or delete the contents of your USB storage

  • Camera

    • take pictures and videos

  • Phone

    • read phone status and identity

  • Accessibility

    • In order to better optimize the memory usage and reduce repetitive operations, we needs Accessibility API to automatically force stop apps.

  • Other

    • bind to an accessibility service

    • update component usage statistics

    • receive data from Internet

    • notifications

    • full network access

    • close other apps

    • control vibration

    • measure app storage space

    • install shortcuts

    • view network connections

    • reorder running apps

    • draw over other apps

    • prevent device from sleeping

    • uninstall shortcuts

    • run at startup

    • connect and disconnect from Wi-Fi

Protection of gathered information

Information that we can collect is stored on protected servers. Special measures are taken to protect information and access is restricted to a limited number of authorized persons, who need the access in order to administer our websites and apps and ensure their proper functionality, especially with regard to technical support.

How user data is used: summary list

The following list summarizes the types of user data that we can receive from the user himself or collect through our apps and services, grouped by the possible uses we can make of them:

Technical support about our products and services (only when users ask for support):

– Operating system;
– Version;
– Kind of device;
– Usage of our products and websites;
– IP address.

When do we collect your information?

We may collect your information: (1) when you license and use our software ("Software Collection"); (2) when you interact with certain portions of our website, such as our forums, blogs, and support center ("Website Collection"); (3) when you communicate with us by email, chat, or otherwise ("Dialogue Collection"); and (4) when you apply to work for us (“Job Applicant Collection”)
  • Simply
        We collect your information when you use our software, website, or otherwise communicate with us.

What information do we collect?

We may collect both personal information and non-personal information. personal information is information that is either expressly provided by you, such as your name, or information that can be used either alone or in combination with other information to personally identify you, such as your email address, phone number, and user name.

We may collect the following personal information from you: Contact Information (such as name, email address, mailing address, or phone number); Unique Identifiers (such as username and password used for authenticating your Mobile Security and Antivirus accounts and products) and machine identification number; Information about your business (such as company name, company size, business type) and; Information related to your usage of our products as described in the next section, below.

Our service providers may collect billing information (credit card number and billing address) on our behalf to process orders.

Non-personal information is all information that is not personal information or is information that was personal information but which we modify and/or aggregate with other data in order to make it Non-personal information. As is true of most websites, we gather certain information automatically. This information may include Internet protocol (IP) addresses, browser type, Internet service provider (ISP), referring/exit pages, the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, date/time stamp, and/or clickstream data to analyze trends in the aggregate, and anonymously generated device identifiers and administer the site.

  • Simply

        There are two types of information we collect: personal and non-personal.


Software Collection – information collected when using our security software

User-Agent String

Each API communication coming from any of our client software identifies itself with a string that includes information about the software itself:

  • The program and build which is sending the request
  • The current license state (as identified by the product)
  • The version of the software as well as any subcomponents (currently, databases) that it uses


GeoIP Data

When we collect data from our client systems, we do not store IP address from which the request originates. However, we do use it to gather geographic information on the system calling in:

  • A location item indicating the continent, country, city, and approximate latitude/ longitude of the user based on your IP address
  • The type of connection (dialup/broadband/satellite/mobile)
  • The ISP through which the connection is made
  • The organization to which the IP address is licensed, if any

Functional Data

We collect data that is necessary for the functionality of the software or for our performance of providing the software to you. For example, we may need to collect system processes and behaviors in order to perform system rollback and recovery operations.

Client Data

In addition to functional data, we collect client data from each program that describe the client environment (i.e., our software and the computer system it is running on). In this, we collect:

  • The operating system the program is installed on
  • The system language in use on that system
  • The processor architecture (i.e., 32- or 64-bit)
  • The file system in use (i.e., FAT32)
  • Information from the Windows Security/Action Center, including security settings and programs installed or in use
  • Information about other Mobile Security and Antivirus program settings and how they are configured
  • Information about how you use our software or services ("Log Data")


Machine Identification Data

We identify each system by assigning each system with a Mobile Security and Antivirus-generated distinct identifier that is created at install time.

We collect data from products corresponding to the products' applicable license state. These data also use a unique identifier. In this, we collect:

  • The key or keys used to license the current product
  • The type of license being used
  • If it represents a console system, the number of seats being managed by that installation of the console
  • Endpoint and network domain information

Malware and PUP Data

We collect data about the malware and PUPs that are detected by our products. We collect:

  • The vendor name of the malware or PUP removed
  • An encrypted description of which database rule was used to remove the malware or PUP in question
  • Artifacts detected as malware, PUPs, or suspicious files
  • Information related to detected artifacts


Trial Data

When a client attempts to start a trial, we track it remotely in order to validate that the trial is allowed. For this information we use another unique system identifier. We collect:

  • The client's request for a trial
  • The start date and duration of the trial provided
  • Any attempted conversion/purchase generated by clicking an in-app link, so that it can be correlated with a trial

Exploit Data

In Mobile Security and Antivirus Anti-Exploit products we collect a complex data object for any exploit process which is blocked by the software. In this data we collect:

  • Process ID of the exploit process
  • File path of exploit process
  • MD5 hash of the exploit payload, if any
  • Command-line arguments passed to the exploit
  • A list of URLs potentially associated with the exploit, including redirect jumps if any
  • Exploit payload files
  • Exploit file-format (doc, pdf, xls, etc…)
  • (Potentially) a copy of the exploit executable itself

Mobile Application Data

When you download and use our Services, we automatically collect information on the type of device you use, operating system version, and the unique device identifier.

We send you push notifications from time-to-time in order to update you about any events or promotions that we may be running. If you no longer wish to receive these types of communications, you may turn them off at the device level. To ensure you receive proper notifications, we will need to collect certain information about your device such as operating system and user identification information.

We do not ask for, access or track any location-based information from your mobile device at any time while downloading or using our Mobile Apps or Services.

We use mobile analytics software to allow us to better understand the functionality of our Mobile Software on your phone. This software may record information such as how often you use the application, the events that occur within the application, aggregated usage, performance data, and where the application was downloaded from. We do not link the information we store within the analytics software to any personal information you submit within the mobile application.

As part of our text message filtering functionality, our Mobile Software also collects text messages from senders who are not in your contacts, and analyzes these text messages to determine whether they are malicious. We only receive the sender information and the body of the message which is analyzed to determine if they contain malicious URLs or come from malicious senders; no information is provided about the recipient. Text messages that are malicious are retained for analysis by our researchers, however, all other text messages are discarded.

  • Simply

        We collect information that allows us to fight against malware and PUPs on your device and contact you if you allow us to send push notifications.

Consent

We may share your personal information with third-party sites or platforms, such as social networking sites, but only if you have expressly requested that we do so.

Similarly, by posting profile, content, or other information, including personal information to a forum or blog, you indicate your consent to its public use. You should be aware that any information you provide in these areas may be read, collected, and used by others who access them. We will list you in our publicly accessible member directory on the forum website.

We also display testimonials of satisfied customers on our websites in addition to other endorsements. With your consent, we may post your testimonial along with your name. If you wish to update or delete your testimonial, you can contact us at khushisutariya21@gmail.com

Security

We take commercially reasonable measures to protect personal information from unauthorized access, use, and disclosure. However, no method of transmitting information over the Internet or storing information is completely secure. Accordingly, we can't guarantee the absolute security of your personal information. 

  • Simply

        Our retention periods differ for each type of personal information, but we only retain such information to fulfill the purposes for which it was collected.

Children

Our services are not directed to children under eighteen, and we do not knowingly collect personal information from children under thirteen. If we learn that we have collected personal information of a child under thirteen we will delete such information from our files as soon as possible, provided, however, that some information may remain in archived/backup copies for our records or as otherwise required by law.

  • Simply

        We don't knowingly collect information on children, and delete it if we inadvertently do collect it.

 Revisions

We may modify and revise this Privacy Policy from time to time. If we make any material changes to this Privacy Policy, we will notify you of such changes by posting them on our website or by sending you an email or other notification prior to the change becoming effective.

  • Simply

        We'll let you know if we revise our privacy policy. If we make a material change, we will let you know before the change takes place.

Comments

  1. Replies
    1. This eases my mind due to when threatened me n 2 family mbers be killed should I not comply. I didn't comply and

      Delete
    2. Yah exalt yenen

      Delete
  2. private information safe and happy New year to all TQ the best time for you read this

    ReplyDelete
    Replies
    1. I'm sorry to burst everyone's happy but she so bad to the bone she done in yalls shit and she is still bad to the bone and through the years I have learned I'm in love with a stripper and yall are in love with a bunch of snoopy ass Brittany orb6 right call them Brittish Intelligence trying to control USA they attack the weak or they thought weak finding out Abad ass grabbed ahold of them due to abuse to my 75 year old veteran foster father he asked me to call him daddy it would please God

      Delete
    2. I'm bad to the bone? You damn right! You are a sneaking lying cheater! What makes you better? Your no better! In fact I know your worse your forgetting I"ve seen what y'all are about and let's just say I would rather be me! Oh and your stripper has been using my name this whole time because y'all both know how bad it looks ! Not to mention what you have done to our kids .

      Delete
  3. Dear sir, please investigator IP address 140.213.73.29. They all hacking privacy data lost. Please report police cyber cryme.

    ReplyDelete
    Replies
    1. My neighbor has been hacking me 6 months recording me audio and visual 6 times wrote to Fbi still nothing only down 15000 grand local pd says to small so will they have access to all my accounts im suppose to stay put like a good boy they don't have much time left get to work

      Delete
  4. Hi I found your site by mistake when i was searching yahoo for this acne issue, I must say your site is really helpful I also love the design, its amazing!. I don’t have the time at the moment to fully read your site but I have bookmarked it and also add your RSS feeds. I will be back in a day or two. thanks for a great site.
    עו"ד רונן אורן

    ReplyDelete
  5. Can't recover my WiFi reouter password

    ReplyDelete
    Replies
    1. Watch out could be evil in the sky don't be lonely take a chance win or loose it might accidentally be a Grubb that has john

      Delete
  6. helpme press hacker in telephone i telephone no work thang you

    ReplyDelete
  7. Hacker in telephone i helpme press

    ReplyDelete
  8. Hi, my daughter and husband have been hacking my phone(s) to my knowledge since October. This is my 3rd phone. They're still in in! Get them out!!!!!!

    ReplyDelete
  9. Check out my Instagram called look_antivirus_skills, This app in super Good and works Flawlessly.

    ReplyDelete
    Replies
    1. Yall now got me crying and my words are thank you for being here cause yall my already knowing helping me and I helping yall cause a young age i was told by a recruiter I was retarded

      Delete
  10. 6a94d77ab390c4d5

    ReplyDelete
  11. 6a94d77ab390c4d5

    ReplyDelete
  12. Replies
    1. fbi haha tried 6 times online called local office hung up on me

      Delete
  13. Good application

    ReplyDelete
  14. I installed it on my phone come Turns off and I have to turn it back on.

    ReplyDelete
  15. I installed it on my phone it turns off I have to turn it back on.

    ReplyDelete
  16. Do not publish or share my info publicly thank you

    ReplyDelete
  17. Doesn't sound too good to me I flippin need something to find out what my dude is doing with my phone..I think he is using the computer

    ReplyDelete
  18. I have never done anything like this before but I need some one to help me

    ReplyDelete
  19. Are you able to help restore my Facebook page? I've been hacked. The fb help has me going in circles.......

    ReplyDelete
  20. Hope you can help me my Facebook account got hacked on Christmas day December 25 2021 and Facebook has done everything to help this person steal all my stuff

    ReplyDelete
  21. I feel like google chat for hangout,whats app for gmail might be sneaky people and i would like to keep eye on google chat for me when im on there

    ReplyDelete
  22. Me gustaría aprender a instalar con mi información la aplicación de Google Play Store, Y Google Play Service , porque son la base del buen funcionamiento del dispositivo y de todo el conjunto de aplicaciones que se instalan y del sistema operativo,para mejor seguridad de la privacidad y de la información personal.

    ReplyDelete
  23. Replies
    1. I think they prey on those that only read some of the we don'ts . They recant everything in the end.
      That's probably why they put a lot of blah blah blahs. .. so it's Long and repetitive and Pete and repeat, we don'ts and recants, tid bits by tid bit All the We don'ts turn into we does does does. Google is the biggest fisher's of them all. Just when you think you found an app that doesn't revolve arond google...low and behold there they are trying to take over your tiny little Pond. It's name.... Privacy Pond

      Delete
    2. Yeah these assholes I got you're in my phone my Wi-Fi Bluetooth putting cameras in my bathroom I mean man if they don't have a life I mean good Lord I just borrows my mind what they think so important about watching somebody sit around their apartment doing basically it's not much and nothing so yeah I know where you're coming from clone your phone cuz it got that HTC something or another on there don't put your phone by my phone don't even touch touch it . according to put a camera box and put it under my table cuz I have a small coffee table up under my table yeah I saw it over there too. kept looking at it. So the dude jumps up and stands in between me and the camera. So glad you got thrown in jail and then he couldn't come back to town I can almost breathe except for the other three neighbor Dwayne and my niece and nephew's dad Jeff and goober they call him his name's David but I'm too stupid and I don't know what's going on official 2 and I bide my time and I put all the little pieces together and got all the dots all lined up and yeah then I throw in a little comments but oh well Life goes on so I was hoping this app help me out but I read the privacy thing oh we don't use that oh no we don't we don't give it away either we no no and then the further you go everything they they can't everything. Wonder when phones are going to get smart enough to put in punctuation itself...

      Delete
  24. I think there is somebody that is keeping from doing things online and is my settings are always changing whoever it is get your own life

    ReplyDelete
  25. I HOPE YOU do a good job it's important to me thank you have a good day

    ReplyDelete
  26. I hope this works!

    ReplyDelete
  27. You're all a bunch of demented mental cases with hate in your hearts and evil in your souls! Visit your local mental health office asap!! They'll be able to get you the help you need! I think finding God would be most helpful as well!! May your tormented souls find peace! Good Luck to you all!

    ReplyDelete
    Replies
    1. Whew weee you some kind of special fish

      Delete
  28. Yes I'm sure that every device that I've owned since 2018 have been hacked this app has shown me the truth, but what do I do especially when it comes to being someone extremely close to me? HELP HELP HELP.

    ReplyDelete
    Replies
    1. I have had my loser/Cheating/Lying Husband doing this to me So I can't see him online Chatting with his little girls
      F**k Jeffrey-Welc . You Lose!!!

      Delete
    2. 4 cell phone in last 4 months all hacked via blue tooth all different tn i know who it is but no law enforcement anywhere so sad

      Delete
    3. Same here!!They say I sell products, monitor EVERY FCN THING I SAY AND DO.And GitHub has been in the past 5 phone's.All the B'S in the world and they choose normal ppl who don't have money for special technology to stop spying and tracking.And God knows the stories they come up with...."My credit cards, products.."blah blah blah.YEA,OKKK...I WISH.

      Delete
  29. How do I log out of your app

    ReplyDelete
  30. Simple don't buy no devil and pay to activate that devil it 💯 percent my truth and so many know my powers even youcannot beat me but I will let you eat me Alia stop putting fear in all these folks asshole you too go lavender up asslittle boy n grow the fuck up before a real man whoop the shit out yo ass son.

    ReplyDelete
    Replies
    1. You want shit sewed out your pocket book

      Delete
  31. News flash u should not denied my 911 phone call

    ReplyDelete
  32. I've evidence that will sit you down n shut yo mouth

    ReplyDelete
  33. This phone facts processed and operates on its own accordance I've no control over What you write but I have control to make the United States begin walking and the public learn survival how to cook with no power to learn 5
    To make a blanket out of fur to kiss 💋 this man you best apologize to Mr Alia

    ReplyDelete
  34. Google LLC I'm going to own your company and YouTube as well I'm going motherfuckers putting fear in people you fucking terrorist ill shoot you n was trained yo do just that and told protect ourselves and our boundaries let no enemy come through at all cost

    ReplyDelete
  35. Hi I appreciate u putting app in the playstore it is very very helpful so far so good thanks okay bye

    ReplyDelete
  36. Very helpful and very pleased.
    However I am unable to find where to put in my security name and password. Thank you

    ReplyDelete
  37. Publish rubish no thanks

    ReplyDelete
  38. Google my phone has been hacked twice now and you did nothing to help me. And now you're going to have us pay for using your service go fuck yourself

    ReplyDelete
  39. This is interesting. Talk some more shit.

    ReplyDelete
  40. I can't believe Google and such are getting away with this. I have literally started believing that I am crazy🤣nit cool I already suffer from head problems didn't need help from. Sources I thought I could trust.

    ReplyDelete
  41. I can't decipher what's what in these messages

    ReplyDelete
  42. I was hacked by destiny in Cole Huffman they been doing it for a year straight so to everyone I'm sorry I cnt control if u would try help tell me how to get them out of my phone they accounts in my phone accounts bank accounts they put videos up of me in my private home they some get surveillance on me oh they are also web designers

    ReplyDelete
    Replies
    1. I believe you . In little ferry NJ the police and a group of their pig collegues hack and start manipulating your cell phone through the hotels wifi access. They can even activate your camera on your cell phone and watch you through apps offered in the app store like endoscope or security monitoring apps. Locals also said they hack on to the cell phone towers and look through the IP addresses of those cell phone using IP4 access via their service carrier. I've reported it to the FCC and athorioties but since they're the ones doing it they just said they'll look into it. Apparently perverts live in that town and police run the meth ring since they sell it themselves hence why they use the motels as targets.

      Delete
  43. Ik grag dis the app for this Dankjewel voor het ongemak

    ReplyDelete
  44. Anyone falls for this shit is a fucking FOOL

    ReplyDelete
  45. I'm going thru it to from a brand new neighbor had my old tn 15 yes had 5 tn 5 phones past 5 months no joke

    ReplyDelete
  46. Heather mims and her son are hacking my phone...his name is Collins mims......they have nothing better to do besides keep tabs on me and Ieft her worthless ass because she likes to duck every man in Watertown...you want free piece call her at315 5238618....good luck

    ReplyDelete
  47. I was charged 9.99 for this service and I don't get the full service still and still have ads. I'm confused on what I paid for?

    ReplyDelete
  48. I would like a code first. To try it. You know economics work first paid later.

    ReplyDelete
  49. sourcererunknown@gmail.com code first please. It's economics work first paid later. If I like I will drop a Lincoln.

    ReplyDelete
  50. IP address blocked

    ReplyDelete
  51. Thank you this information was enlightening!

    ReplyDelete
  52. Thank you the information is explain very well I understand how it works 👍

    ReplyDelete
  53. SSL://AGENT ADRIAN P TILLMAN.SSL:

    ReplyDelete
  54. Wow ......what an amazing app 👏 I must have tried
    Close to 100 in a month ,i was about to say screw it
    Then I see this one ,and I say to myself it's just like the others ones,started playing with it since 6pm its
    3:00am and I still haven't go tru everything still,im tired of this people violating are privacy, is real unhumane,,you guys can imagine thousands of people looking at your pics,and basically we been profile by are phones,this data researchers at least they should pay us for that data,that by the way we given it to them,making millions of dollars of free data it's a shame,and the worst part is they selling us the phone for crazy amount of %$$$ ,at least they should have the courtesy to give it to us free,,if everyone just stop using social media,and n buy urself a track phone no data, I think they will get the point, screw all that social media crap all its doing its taking are kids from us,and polluting their minds with false information,and you guys can see look at the news today, all you see is kids shooting in schools,how they leardto use a gun? 🤔huh
    The big boss. Thanks google for everything
    They have done for are kids and society👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏you can be anyone with gooogle,a cop,a president,ceo,whatever don't waste your money in college n why go if you can learn anything you want to be as a carrier tru Google
    I thank them for my knowledge,,you don't even have to have a degree,I put this for a test,I went from
    Earning 35 k a year,to 100k a year with a week of study,everyone has bachelor's degree high school diplomas,I say I'm going to give it a try the worst is no.so I bougth me a nice Armani suit tailor made I study hard for this interview,,learn basics of the job
    And go from there,anyways 7mens were there and I
    Can't believe what just happens .....got the job with out a high school diploma and any bachelors,the man was impressed on how well I answer his questions basically I knew what he wants to hear,
    That was my first jobnow I in 6 levels higher,I can say thank you for me,not for are kids,,free info people
    And thank you for this apps to whoever great job!

    ReplyDelete
  55. Can you help bot phone

    ReplyDelete
  56. She loses it American? What are they doing

    ReplyDelete
  57. Says Hi Google does it work yet?💨🤯

    ReplyDelete
  58. I think this is a wonderful idea to give piece of mind we all are safe thank you I really appreciate your help.

    ReplyDelete
    Replies
    1. morganTerry114@gmail.com is not a company but a retire, coal miner's and I have no computer iphone cmurile is fraud and all 3 devices are fraud,,I'm not a 88,I TracFone account number 606275e296

      Delete
  59. Just please stop hacking all of my phone conversations, text, contacts, emails, screwing with my internet, adding apps I don't use need or want your just an invasion of privacy all around God for give all of you..

    ReplyDelete
  60. sourcererunknown@gmail.eiu

    ReplyDelete
  61. امین بیرالوند

    ReplyDelete

Post a Comment