★ Bubble Crusher is the most thrilling bubble popping game. Pop, pop, pop those bubbles! Bubble Crusher is an extremely fun bubble popping game that requires you to be quick. Pop the bubble, but don't pop them twice! There is a simple fun ...Read more
★ Bubble Crusher is the most thrilling bubble popping game. Pop, pop, pop those bubbles!
Bubble Crusher is an extremely fun bubble popping game that requires you to be quick. Pop the bubble, but don't pop them twice! There is a simple fun elements with the different twists and challenges that is bound to make you laugh and enjoy.
Bubble Crusher is ideal to play when you have a few minutes and want a quick break during the day. The game currently offer two exciting game modes, with more game modes coming soon!
▲ Dual Mode – NEW:
Challenge your friends to play Bubble Crusher as Dual Mode allows two players to play against each other in one device!
▲ Classic Mode: Stay focused since you have two minutes to play and beat all the levels. You have to be focused in the early rounds and complete them so that you have more time at the end. It's challenging, fun, and will provide hours of fun. The objective is to find the hidden key in each level while avoiding the dreaded skull.
▲ Zen Mode: Allows you to pop as many bubbles as you can to earn points in 2 minutes, while avoiding the dreaded skull. Plus get bonus seconds and points by finding the key and popping certain bubbles. You have to be quick, since the bubbles will refill.
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
modify/delete SD card contents
Allows an application to write to the SD card.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.