-
and above systems set contact encryption.
Enter**--Long press the contact that needs to be encrypted--Encrypt Encrypt the contact--Enter the privacy password to encrypt it. After encryption, the contact's number will not be displayed in the address book, which can prevent third-party apps from reading the address book information, and you need to verify the password when viewing conversation, call, and contact details.
2. FunTouch OS sets contact encryption in the following systems.
Go to i Butler - Privacy Space - Communication - "+" sign in the upper right corner - Select the contact that needs to be encrypted - Done. After encryption, the contact's number will not be displayed in the address book, which can prevent third-party apps from reading the address book information, and you need to verify the password when viewing conversation, call, and contact details.
-
Hello; You can use Tencent Mobile Manager to encrypt your mobile phone contacts, which can encrypt important private information to ensure that personal privacy is not exposed and achieve comprehensive privacy protection. Adding contacts in a private space can be entered manually, selected from the contact book, and more
Select from the SMS list, etc., and after you select, the private contact will be affected by the text messages and call logs you have sent and received in the past.
Cut" to a private space. Long press on the added private contact to initiate the first private text message. Thank you.
-
You can go under the software.
Any mobile phone can be, I just use TouchPal**, support the privacy address book function, mainly able to hide contacts, call logs and the operator's call bill function, support traceless hiding, very good.
-
Open the address book, which can be accessed through the settings or through the ** icon;
Click "Group" in the upper right corner to enter the display settings interface of the address book;
Select Hide All Contacts; When you enter the address book again, you can only see your own ** number, if you don't set the local number, it's a blank address book.
-
The phone has encryption, you can see it in the settings. There is a safe option.
-
What's going on in the next 360 secrecy You'll know when you get down.
-
1. Click the SMS icon to enter the SMS interface. 2. Press and hold the top of the screen and slide it down until a lock appears. 3. Click on the private settings below. 4. Click Add Private Contacts at the bottom.
-
79 mobile phone installation of personal privacy.
-
Turn on your phone.
Contacts permission copy.
It is to allow a third party to obtain address book information, and the steps to open it are as follows:
1. Find the settings item in your phone first.
2. Scroll down to find Permission Management and click it.
3. There is an option to read contacts in the permission management, click it.
4. Third-party software is used as an example of QQ, and scroll down to find QQ.
5. At this time, three options will pop up: Allow, Prompt, and Forbidden, and you can select Allow according to the need.
-
In the permission management, that is, the bai can be operated
to succeed. The following zhi will take the Xiaomi hand dao machine as an example: specialized.
1. Find "Security" in your Xiaomi phone.
Genus Center" and open.
2. After entering, click "Authorization Management".
3. Then click "Permission Management" above to find "** and Contacts".
4. After entering, you can set the permissions of the address book.
-
Open the [Settings] of the mobile machine and find the [Permission Tube.]
Du Li] option, click zhi
Click [Read Contacts] DAO, in the application back list, click the permission software you want to prohibit, and you can select the options of [Allow], [Prompt] and [Prohibit] in the pop-up menu, and select [Prohibit]. Here's a closer look:
1. Open the [Settings] of the phone, find the [Permission Management] option and click to enter, then find the [Read Contacts] in the address book, and click to enter;
2. In the list of [Read Contacts], a list of applications will be displayed, click on the software you need to prohibit permissions; Click it to pop up a menu, you can select the options of [Allow], [Prompt] and [Prohibit], select [Prohibited];
-
In fact, many people's mobile phones have these, and we can use relevant mobile phone software.
In Tencent Mobile Manager, the private ridge secret space can encrypt the text messages and call records of designated private people to ensure privacy and security. These encrypted text messages and call logs will only be displayed in Tencent Mobile Manager, and no records will be left in the system SMS inbox and Tongspine call records. So even if someone looks through your phone, they won't see them.
-
If you are using a vivo phone, the following steps can be used to unencrypt contacts
1. Funtouch OS and above systems cancel contact encryption and enter**--Long press the encrypted contact--Decrypt Decryption Contact--Enter the privacy password to complete the decryption. After decryption, your call history and text messages with the contact will be decrypted.
2. FunTouch OS The following system cancels the contact encryption and enters i Butler - Privacy Space - Communication - Long press the contact - Decryption. After decryption, your call history and text messages with the contact will be decrypted.
What should I do if my phone's address book is suddenly gone?
First of all, you need to decide, what kind of mobile phone are you? Apple? Or Huawei? Because the mobile phone is different, so there may be subtle differences, the following can only provide ideas, the specific situation still needs to be analyzed, but I still hope to help you. >>>More
Mobile phone contacts may also encounter mobile phone numbers that have been invalidated, do you know how to delete such mobile phone numbers? Today, I will teach you how to delete contacts in one by one and delete all contacts in batches. >>>More
1. Enter "* *" on the dialing page to open the "test" interface of the mobile phone. >>>More
iPhone phones do not support batch deletion of contacts, so when we need to do mass batch deletion of contacts in our phone, how should we operate? >>>More