TEMU application – dangerous application? He discovers that she was already on the phone…

TEMU application – dangerous application? He discovers that she was already on the phone…
TEMU application – dangerous application? He discovers that she was already on the phone…
--

Can someone explain to me how TEMU recognizes that even after completely restoring the data in the mobile phone and setting up a completely new google account on the phone, it was ever there?How else to explain the following:There is a game on Temu (one round always lasts 24 hours) where you send your sharing link and when a new user registers through it, you get some coins and when you get 900 coins, you get 900 CZK in credits to your account (to the beginning you will get maybe 840 coins, so let’s say it’s enough to recommend it to about 6-8 new people). If someone already has the application, you will get CZK 1-3 in credits (max. from 10 people per day).I have multiple cell phones at home. When I registered the TEMU application on my mobile for the first time via the link (it was never there in the past), it normally accepted the link and I got the coins to my main account.Since I don’t have an infinite number of mobile phones, I wanted to “scratch” it by doing a factory reset and using a new google account to register in TEMU again via the link… But this time it didn’t accept my link from the main account and threw up a message: “Your request was rejected because we detected unusual activity that does not correspond to the intended operation of the program”..So I explain it in the way that the TEMU application somehow finds out from the android system either the SN of the phone or I don’t know the IMEI of the phone and thus it no longer recognizes it as the first new installation on that phone.Is it possible, do applications really have that much access to data if you don’t give them permission?Does anyone have experience with it?

The article is in Czech

Tags: TEMU application dangerous application discovers phone ..

-

NEXT The end of leaky computers, programs and primitive passwords in the EU – Connect.cz