It may request access to storage, contacts, or device settings. Review permissions carefully and avoid granting unnecessary access.
It may request access to storage, contacts, or device settings. Review permissions carefully and avoid granting unnecessary access.