Walkie Talkie Mail use email of your friends as a walkie talkie. No need external server or other accounts. Push and talk with your friends. The eMail server is used as bridge for voice transition in half-duplex mode. This application can ...Read more
Walkie Talkie Mail use email of your friends as a walkie talkie. No need external server or other accounts. Push and talk with your friends.
The eMail server is used as bridge for voice transition in half-duplex mode.
This application can use IMAPS or POP3 server, but IMAPS servers (like gmail.com) are preferred.
Install the application, configure it and talk with friends who have Walkie Talkie Mail installed. Write their email in the box, press PTT and talk.
With RANDEVOU function you can localize the people who are talking with you and achieve them.
Now you can send also VIDEO trunk and with new function CHAT you have a good free alternative to WhatsApp. Moreover with Walkie Talkie Mail your messages (voice, video and chat) are saved only in your own mail and immediatly removed from application after the deliver to guarantee your privacy and security.
Do you have a question about this app?
UPDATED ON: Mar 2, 2015
INSTALLATIONS: 100,000 - 500,000
LATEST VERSION: 3.0.33
REQUIRED ANDROID VERSION: 2.3 and up
full Internet access
Allows an application to create network sockets.
view Wi-Fi status
Allows an application to view the information about the state of Wi-Fi.
discover known accounts
Allows an application to get the list of accounts known by the phone.
Allows application to access the audio recording path.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.