ChimeraTool is a software, the use of which is regulated by a license available for sale at any given time. The software may only be used with a valid license, on the designated computer the license is associated with.
In the following, you can read about how and where you can make a purchase, how you can join our reseller network, and all the important information you need to know to be clear on what factors can contribute to exclusion from the network.
How do the ChimeraTool PRO and the ChimeraTool PREMIUM licences compare?
The ChimeraTool PREMIUM licence and the Authenticator make repairing mobile phones easy.
information about some sub menu under the DASHBOARD
How to switch registered computer
Some important information about the purchase of Chimera Authenticator
Installing the drivers and why they are needed
How can you use your chimera credits.
Resellers: how to find a reseller near to you?
ClanGSM is not our official forum but it can bring help to all our Spanish-speaking customers, since the questions asked are answered by professionally relevant users and administrators there.Open forum
This is our official English-language forum. We recommend it for all of our users, because many problems and errors have been described and answered here over the years.Open forum
We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.
Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:
We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.
You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions
As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.
In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.
All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.