Sign in

Sign in to confirm

Have you forgotten your password?

... or login with Facebook:

Don't have an AndroidPIT account yet? Sign up

Gem Breakers Lite

  • Description

    Build huge power gems and break them in chains in this fast-paced arcade falling block classic! * 5 Game Modes * Online High Scores * Play versus an AI * Scoreloop (1.6+ only) * Zeemote support (2.0+ only) KW: fighter, super awesome, puzzle gameRead more

App Questions

Do you have a question about this app?

Top Apps

App Details

  • UPDATED ON:
  • GRÖSSE: 5,452,595
  • INSTALLATIONS: 10,000 - 50,000
  • LATEST VERSION: 2.56
  • ERFORDERLICHE ANDROID-VERSION: 2.2 and up
  • Permissions
  • NETWORK COMMUNICATION
    • full Internet access
      Allows an application to create network sockets.
    • view network state
      Allows an application to view the state of all networks.
    • view Wi-Fi state
      Allows an application to view the information about the state of Wi-Fi.
    • create Bluetooth connections
      Allows an application to view configuration of the local Bluetooth phone, and to make and accept connections with paired devices.
  • SYSTEM TOOLS
    • retrieve running applications
      Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
    • bluetooth management
      Allows an application to configure the local Bluetooth phone, and to discover and pair with remote devices.
    • prevent phone from sleeping
      Allows an application to prevent the phone from going to sleep.
  • PHONE CALLS
    • read phone state and identity
      Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
  • YOUR PERSONAL INFORMATION
    • read contact data
      Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
  • YOUR LOCATION
    • coarse (network-based) location
      Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.