ChimeraTool

NotificationsTurn on notifications to get up-to-date application version information!Subscribe!  No thanks

Developer Support Request

This feature is only available to logged in users.

Please, login to continue!

Login

What is dev support?

We created this section to provide a fast and direct communication channel for our pro users. Send us what phone models and what functions you want us to add to Chimera.

As much as we try, we can’t always keep track of all, newly released phones. These days, there are so many manufacturers and even more markets in the World that demand thousands of different phone models. However, just because we are not aware of them, it doesn’t mean that Chimera can’t support these unknown models. In most cases, Chimera functions are already available for a very similar model and it would take us a very short time to add support for new models that are unknown for us yet.

Using the Dev Support section you can send us unsupported models and features that you would like to see working, and supported in Chimera. The phone models and features you submit on this page, goes directly to our technicians and developers, and in many cases, they will work in the next Chimera release.

Dear Guest,

We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.

Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:

We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.

You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions

As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.

In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.

All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.

 Got it