The Best twitter App to have with you for Events and Conferences. HashChat creates a virtual Chatroom out of tweets, hashtags and people talking about an Event or Conference which you would not want to miss. Quickly introduce yourself to ...Read more
The Best twitter App to have with you for Events and Conferences.
HashChat creates a virtual Chatroom out of tweets, hashtags and people talking about an Event or Conference which you would not want to miss. Quickly introduce yourself to people you meet during Events and get back to them later with HashChat's "QuickIntro". HashChat is also a fully featured twitter app with a design and user interface that touches simplicity with beauty.
Creates a Chatroom from the Hashtag of an event, conference or a trending topic. #rooms list the current existing #rooms being used and where you can join in. You also have the freedom to create new #rooms.
There are many instances when we meet someone at a conference or at a meeting for while and we wish to stay connected. QuickIntro does just that! By introducing you to the people you meet with all the contact details you wish to reveal. It also helps to keep a track of the people you meet.
List out all the people in the #rooms. So you can see their profiles, meet, connect and grow your network.
HashChat is a beautiful full-featured Twitter app. HashChat has all twitter functions and much more!
Do you have a question about this app?
UPDATED ON: Nov 9, 2015
INSTALLATIONS: 5,000 - 10,000
LATEST VERSION: 5.0
REQUIRED ANDROID VERSION: 2.3 and up
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
modify/delete SD card contents
Allows an application to write to the SD card.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
false location sources for testing
Create false location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or network providers.