梦幻超进化

Legal related-copyright notice

Without the written permission of the person, any unit or individual shall not use, copy, modify, transcribe, disseminate or bundle any part of the above-mentioned products, services, information or materials in any way or for any reason.

If you have any questions, please email: jtcztbt@126.com

Chian Network owns intellectual property such as copyright, including but not limited to the entire content of the product or service that is issued or jointly issued with a partner company, and is protected by law.

Without the written permission of the owner, no unitor individual may use, copy, modify, copy or transmit any part of the above products, services, information, or materials in any way or for any reason.

Private Policy

Provide services to you.

Chian Network regards user information security and privacy protection as his "lifeline." We adhere to the "everything based on user value" philosophy, and strive to improve the transparency of information processing, enhance your convenience of information management, and protect your information and communication security.

Chian Network strictly abides by laws and regulations and follows the following privacy protection principles to provide you with safer and more reliable services:

1,

Safe and reliable: We make every effort to prevent your information from being leaked, damaged or lost through reasonable and effective information security technology and management processes.

2,

Self-selection: We provide you with convenient information management options so you can make the right choices and manage your personal information.

3,

Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.

4,

Reasonable: In order to provide better service to you and other users, we only collect the necessary information.

5,

Clear and transparent: We strive to use a concise statement to introduce you to the privacy policy so that you can clearly understand how our information is handled.

6,

Incorporate privacy protection into product design: We integrate various concepts such as law, product and design into all aspects of product or service development, and incorporate the concept of privacy protection.

This Privacy Policy mainly explains to you:

What information we collect;

The purpose of our collection of information;

Your rights.

I hope that you read the Privacy Policy (hereinafter referred to as "this policy") to learn more about how we collect and use information so that you can better understand our services and make appropriate choices.

By using Chian Network 's services, you are agreeing to what we have described in this policy. Terms used in this policy have the same meanings as in the User Agreement unless otherwise agreed.

If you have any questions, please contact us.

First, the information we collect

We collect only the information necessary to achieve product functionality based on legal, justified, and necessary principles.

1.1

Information that you provide when you use our services

1.1.1 Information you fill out when you register your account.

For example, the nickname and mobile number you filled in when you signed up for an account.

1.1.2 Information that you upload when you use the service.

For example, when you use an app, upload an avatar, shared photo.

1.1.3 Information submitted by you through our customer service or attending our events.

For example, a questionnaire you fill out when participating in our online event may include your name, phone number, home address, and more.

Some of our services may require you to provide specific personally sensitive information to achieve specific functions. If you choose not to provide this type of information, you may not be able to use certain features in the service, but it will not affect your use of other features in the service. By providing your personally sensitive information, you consent to the processing of your personally sensitive information in accordance with the purposes and methods described in this policy.

1.2

Information we get when you use the service

1.2.1 Log information. When you use our services, we may automatically collect relevant information and store it as service log information.

(1) Equipment information. For example, device model, operating system version, unique device identifier, battery, signal strength, and more.

(2) Software information. For example, the version number of the software, the browser type. To ensure the security of the operating environment or to provide services, we collect information about the mobile apps and other software you use.

(3) IP address.

(4) Service log information. For example, information you search, view, service failure information, referral URLs, etc. when you use our services.

(5) Communication log information. For example, the account, communication time, and duration that you used to communicate when using our services.

1.2.2 Location information. When you use location-related services, we may record the location of your device to provide you with relevant services.

(1) When you use the service, we may obtain your geographic location information through IP address, GPS, WiFi or base station;

(2) The information provided by you or other users when using the service may include information about your location, such as the information about your area that may be included in the account information you provided, and the geo-tagging information contained in photos shared by you or others. ;

1.2.3 Other relevant information. To help you make better use of our products or services, we collect relevant information. For example, we collect buddy lists, group list information, and voiceprint feature value information. To ensure that you can use our services to reach people you know, if you choose to enable the Import Contacts feature, we may encrypt your contact's name and phone number and collect only the encrypted information.

1.3

Information shared by other users contains your information

For example, photos posted by other users or shared videos may contain your information.

1.4

Information obtained from third-party partners

We may obtain information that you generate or share when you use a third-party partner service. For example, when you use your account to sign in to a third-party partner service, we'll get the name and login time of your third-party partner service, so you can manage it. Please read carefully the user agreement or privacy policy of the third party partner service.

Second, how do we use the information we collect?

We strictly abide by the laws and regulations and the agreement with the users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain it to you again and obtain your consent.

2.1

Provide services to you.

2.2

Meet your individual needs. For example, language settings, location settings, personalized help services.

2.3

Product development and service optimization. For example, when our system fails, we record and analyze the information generated by the system failure to optimize our services.

2.4

Security. For example, we use your information for authentication, security, anti-fraud monitoring, archive backup, customer security services, and more. For example, security software that you download or install detects malware or viruses or identifies fraudulent information for you.

2.5

Recommend ads, news, and more that may be of interest to you.

2.6

Assess and improve the effectiveness of our advertising and other promotions and promotions.

2.7

Management software. For example, perform software certification, software upgrades, and the like.

2.8

Invite you to participate in a survey about our services.

In order to give you a better experience, improve our services or other uses that you agree to, we may use the information collected through certain services for our other services, subject to relevant laws and regulations. For example, use information about one of our services for another service to show you personalized content or ads, for user research analysis and statistics.

To ensure the security of our services and to help us better understand how our applications are performing, we may record information such as how often you use the application, fault information, overall usage, performance data, and the source of the application. We do not combine the information we store in the analysis software with the personally identifiable information you provide in the application.

How do we use cookies and related technologies?

We or our third-party partners may collect your information by placing secure cookies and related technologies in order to provide you with a more personalized user experience and service. We will strictly require third-party partners to comply with the relevant provisions of this policy.

You can also manage your cookies through your browser settings. However, please note that if you disable cookies, you may not be able to enjoy the best service experience and some services may not work properly. If you would like more information on the security of cookies, please see the Cookie Policy Note.

Fourth, the information you share

You can share your information with your friends, family and other users through our services. For example, the text and photos you share publicly on the WeChat circle of friends. Please note that this may include sensitive information such as your personally identifiable information, personal property information. Please carefully consider disclosing your relevant personal sensitive information.

You can control the scope of your shared information through the privacy settings in our services, or you can delete your publicly shared information through the settings in the service or the guidelines we provide. However, please note that this information may still be stored independently by other users or non-associated third parties not under our control.

How do you manage your information?

5.1

You may access, modify and delete the registration information and other personal information you provide while using our services, or you may follow the notice guidelines to contact us. The scope and manner in which you access, modify, and delete personal information will depend on the specific service you use. For example, if you want to stop sharing your location information when using location-related services, you can stop sharing by using the mobile phone location shutdown feature, software and hardware service provider and communication service provider shutdown. I suggest you read the relevant guidelines carefully. .

5.2

We will collect and use your information only as described in this policy for the functionality of our products or services. If you find that we have violated laws, administrative regulations or the agreement of both parties to collect and use your personal information, you can ask us to delete it. If you find that your personal information collected and stored by us is incorrect, you can also ask us to correct it. Please contact us through the contact details listed in this policy.

5.3

When you access, modify, and delete information, we may ask you to authenticate to keep your account secure.

5.4

Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all of your requirements and we will respond to your request within a reasonable timeframe.

6. Information we share

We strictly restrict the sharing of information in accordance with laws and regulations, such as:

6.1

We may share your personal information with third parties with your prior consent;

6.2

For the sole purpose of external processing, we may work with third party partners (third party service providers, contractors, agents, advertising partners, app developers, etc., for example, to provide email or push notifications on our behalf. Providers, map service providers that provide us with location services) (they may not be in your jurisdiction) share your personal information and let them follow our instructions, privacy policies and other relevant confidentiality and security measures. Process the above information and use it for the following purposes:

6.2.1 provide you with our services;

6.2.2 achieve the stated purpose of the “How we use the information collected” section;

6.2.3 fulfill our obligations under the User Agreement or this Policy and exercise our rights;

6.2.4 Understand, maintain and improve our services.

If we share your information with the above-mentioned third parties, we will use encryption, anonymization and other means to protect your information.

6.3

As our business continues to develop, when mergers, acquisitions, asset transfers, etc. result in the sharing of your personal information with third parties, we will inform you of the relevant situation by means of push notifications, announcements, etc., in accordance with laws and regulations and not less than The standards required by this policy continue to protect or require new administrators to continue to protect your personal information.

6.4

We will use the information we collect for big data analysis. For example, we use the information we collect to analyze urban thermograms or industry insight reports that do not contain any personal information. We may disclose and share with our partners information that is processed without post-identification content to understand how users use our services or to inform the public about the overall usage trends of our services.

6.4

We may disclose your personal information for the following purposes:

6.5.1 Comply with applicable laws and regulations and other relevant regulations;

6.5.2 comply with the provisions of court decisions, rulings or other legal procedures;

6.5.3 comply with the requirements of relevant government agencies or other legally authorized organizations;

6.5.4 We have reason to believe that we need to comply with relevant laws and regulations;

6.5.5 Reasonable and necessary use for the protection of the personal and property safety or other legal rights of our customers, us or our affiliates, other users or employees for the purpose of implementing the relevant service agreements or this policy, safeguarding the public interest.

7. Information we may send you

7.1

Information push

We may send you emails, text messages, news or push notifications when you use our services. You can choose to unsubscribe on your device by following our tips.

7.2

Service related announcement

We may issue service-related announcements to you when necessary (for example, when a service is suspended due to system maintenance). You may not be able to cancel these announcements that are related to the service and that are not advertising.

Eight, the location and duration of the stored information

8.1

Location where information is stored

We comply with the laws and regulations and store the personal information collected by users in China.

8.2

Term of information stored

In general, we retain your personal information for the shortest period of time necessary to achieve its purpose. However, in the following cases, we may change the storage time of personal information due to legal requirements:

8.2.1 To comply with applicable laws and regulations and other relevant regulations;

8.2.2 to comply with court decisions, rulings or other legal procedures;

8.2.3 in order to comply with the requirements of relevant government agencies or statutory authorized organizations;

8.2.4 We have reason to believe that we need to comply with relevant laws and regulations;

8.2.5 The purpose reasonably necessary to protect the personal and property safety or other legal rights of our customers, us or our affiliates, other users or employees for the purpose of implementing the relevant service agreements or this policy, safeguarding the public interest.

In the event that our products or services cease to operate, we will notify you by, for example, push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.

Nine, information security

We provide appropriate security for your information to prevent loss, misuse, unauthorized access or disclosure.

9.1

We strictly abide by laws and regulations to protect users' communication secrets.

9.2

We will use various security measures to ensure the security of information within a reasonable level of security. For example, we use encryption (eg, TLS, SSL), anonymization, and other means to protect your personal information.

9.3

We establish specialized management systems, processes and organizations to ensure information security. For example, we strictly limit the range of people accessing information and require them to comply with confidentiality obligations and conduct reviews.

9.4

In the event of a security incident such as a personal information disclosure, we will initiate an emergency plan to prevent the expansion of security incidents and inform you by push notifications, announcements, etc.

Ten, advertising

We may use your relevant information to provide you with ads that are more relevant to you on relevant websites, apps and other channels. You can learn more about the ad page.

Eleven, protection of minors

We attach great importance to the protection of personal information of minors. In accordance with the relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parent or legal guardian before using Tencent's services. If you are a guardian of a minor, please contact us through the contact details in Section 13 when you have questions about the personal information of the minor you are monitoring.

Twelve, the scope of application

This policy applies to all of our services. However, some services have their own specific privacy guidelines/statements that more specifically describe how we process your information in the service. In the event of any inconsistency between this policy and the privacy guidelines/claims for a particular service, please refer to that particular privacy guide/declaration.

Please note that this policy does not apply to services provided by other companies or individuals. For example, you can use a WeChat account to log in to other companies or individuals.

Your use of such third party services is subject to its Privacy Policy (not this Policy) and you will need to read the policies carefully.

Thirteen, contact us

If you have any questions about this policy or other related matters, please contact us through the contact information indicated at the bottom of the official website.

We will review the issue as soon as possible and respond within 30 days of verifying your user status.

Fourteen, change

We may revise this policy in due course. If such changes result in a substantial derogation of your rights under this Policy, we will notify you by prompting you at the prominent location on the page, by sending you an email, etc., before the change takes effect. In such a case, if you continue to use our services, you agree to be bound by the revised policy.

You can share your information with your friends, family and other users through our services. For example, the text and photos you share publicly on the WeChat circle of friends. Please note that this may include sensitive information such as your personally identifiable information, personal property information. Please carefully consider disclosing your relevant personal sensitive information.

How do you manage your information?

Your use of such third party services is subject to its Privacy Policy (not this Policy) and you will need to read the policies carefully.

For example, a questionnaire you fill out when participating in our online event may include your name, phone number, home address, and more.

Incorporate privacy protection into product design: We integrate various concepts such as law, product and design into all aspects of product or service development, and incorporate the concept of privacy protection.

(1) Equipment information. For example, device model, operating system version, unique device identifier, battery, signal strength, and more.

Information that you provide when you use our services

Security. For example, we use your information for authentication, security, anti-fraud monitoring, archive backup, customer security services, and more. For example, security software that you download or install detects malware or viruses or identifies fraudulent information for you.

User Agreement

Part I Important

This "Online Game End User License Agreement" (hereinafter referred to as "Agreement") is the user's (individual or single entity, hereinafter referred to as "User") and Chian Network regarding this online game (including any modification of the online game, The legal agreement for the use of the update, all previous versions and subsequent versions, hereinafter referred to as "online games".

1. Agreement content

1.1 main content:

The first part of the important tips; the second part of the rights statement; the third part of the necessary clauses; the fourth main terms; the fifth part of the user code;

1.2 Change content:

All of the above, Chian Network reserves the right to make changes based on operational needs. All changes and updates will take effect immediately after the end of the objection period specified by Chian Network;

1.3 new content:

Other rules that Chian Network publishes periodically or irregularly according to operational needs, including but not limited to other official information such as forum forum rules, code of conduct, activity rules, definition interpretation, etc.

Please note that in view of the user's habit of using the online game service, the user is obliged to re-read the entire contents of the end user license agreement on a monthly basis from the date of using the Chian Network service. In view of the above agreement, the user is not satisfied with the performance. Those who have such obligations are not entitled to object to the legal effect of the relevant provisions without knowing the above.

2. The obligations of Chian Network

2.1 The legal Chian Network's obligation to take reasonable care to the attention of the user will be achieved as follows:

In this agreement, Chian Network reminds the user of the relevant terms in a reasonable manner, such as underline and red mark, which are enough to draw the user's attention. (It is important to emphasize that it is not limited to the user should pay special attention to any unspecified “including” ", "disclaimer", "not", "reject" and other terms of similar terms), these terms shall be applied to this Agreement to the fullest extent permitted by Chinese law. Unless the user accepts all the terms of this agreement, he or she is not authorized to install, copy, access Chian Network related websites, recharge, run client software or otherwise use online games.

3. User's rights

In case of any objection to the above mentioned terms and any content of this agreement, the user has the right to refuse to click to agree or to express an objection to Chian Network by phone or email within 30 days after any agreement is updated, changed or modified.

Any of the following actions of the user will be deemed as the user's complete recognition of the agreement. This User Agreement will take effect immediately and be fully legally binding on Chian Network and the user: (1) Click on any part of registration, download, use, etc. (2) use the online game products and services provided by Chian Network in any way that may or may have interacted with the online game; (3) not call or within 30 days after the update, change or modification of the agreement, rules, etc. Send an email to Chian Network to object.

4. User's approval

In view of the fact that Chian Network has fulfilled its obligations under the format clauses, the above actions of the user will be deemed and should be regarded as the legality and validity of the terms that the user has fully paid attention to and agreed to all the terms of this agreement, especially the user's attention. The User shall not claim or require the Court or any other third party to confirm that the Terms are illegal or invalid on the grounds that Chian Network does not promptly alert the user to the format terms or does not fulfill the stated obligation on the User's request.

5. Minors pay attention to the terms

Minors should review and accept this agreement in the company of a legal guardian. For minors under the age of 14, you must apply for registration in the name of a legal guardian by their legal guardian. Minor users should use "online games" and conduct online games to a reasonable extent. Chian Network has the right to impose relevant restrictions in accordance with the law.

Part II Statement of Rights

1. Intellectual property

This product and the instruction manual are protected by copyright law. All programs and graphic contents may not be copied, reproduced or modified in whole or in part by any means without the written permission of the authorized party and the operator. All related product names, trademarks, brands and pictures on this product and in the packaging and manuals are owned by the authorized party or Chian Network and are the property of their respective owners.

The entire content of online games (including but not limited to any computer code, game characters, game character names, game character information, story background, plot language, place name settings, task design, economic system, trading system, production building system, social system The intellectual property rights of the confrontation function, character image, sound effect, map props, motion rendering, team system, game concept, art work, sound effects, music, audio and video, documentation, and game client and server software are owned by the authorized party. All rights to perform this Agreement are legally available based on authorization.

2. game account

The ownership of the online game user account is owned by Chian Network. After the user successfully registers, the user's right to use the online game user account is obtained, and any data information generated by the game account and stored in the Chian Network database (including but not limited to account data) The ownership of information, role data information, etc. belongs to Chian Network. Under the premise of full compliance with the agreement, the user has the right to use the agreement specified in the agreement for the data information belonging to his user account during the normal use of the online game.

Virtual item

Virtual items in online game products and services, including but not limited to ingots, coins, gold, game coins, virtual equipment, virtual items, etc., are owned by Chian Network and are generated based on the virtual item and stored in the Chian Network database. The ownership of any data information (including but not limited to virtual item data information, grade item data information, etc.) belongs to Chian Network. Under the premise of full compliance with the agreement, the user has the right to use the agreement specified in the agreement for the data information belonging to his virtual item during the normal use of the online game.

Part III Essential Terms

1. Account registration

1.1 The user promises to register as a Chian Network user in his true identity, and to ensure that the personally identifiable information provided is true, complete and valid, and bears corresponding legal responsibility for the information provided in accordance with legal provisions and mandatory terms.

1.2 After the user registers as a Chian Network user in his or her real identity and needs to modify the personally identifiable information provided, Chian Network shall provide the service in a timely and effective manner.

2. User account usage and custody

2.1 According to the mandatory provisions, Chian Network has the right to review whether the identity information provided by the user registration is true and effective, and should actively take reasonable measures such as technology and management to ensure the security and validity of the user account; the user is obliged to keep it safe. Account and password, and use their account and password correctly and securely. If any party fails to perform the above obligations resulting in the loss of the account password, the account is stolen, etc., causing damage to the civil rights of the user and others, the legal liability arising therefrom shall be borne.

2.2 The user has rights and assumes responsibility for the actions of the account held after login.

2.3 If the user finds that his account or password has been illegally used by others or has abnormal use, he shall promptly notify Chian Network according to the processing announced by Chian Network and have the right to inform Chian Network to take measures to suspend the login and use of the account.

2.4 Chian Network shall take measures to suspend the login and use of the user account according to the user's notice. Chian Network shall require the user to provide and verify the personal valid identity information consistent with the registered identity information.

2.4.1 Chian Network verifies that the personal valid identity information provided by the user is consistent with the registered identity information, and shall take measures to suspend the login and use of the user account in a timely manner.

2.4.2 Chian Network violates the agreement of 2.4.1. If the measures are not taken in time to suspend the login and use of the user account, and therefore cause losses to the user, they shall bear the corresponding legal responsibilities.

2.4.3 Chian Network has the right to refuse the user's request if the user does not provide his or her personal valid ID or if the personal valid ID provided by the user is inconsistent with the registered identity information.

2.5 In order to maintain the legitimate rights and interests of the user and provide Chian Network with personal valid identity information consistent with the registered identity information, BobWalker shall provide the user with the necessary assistance and support for the account registrant certificate, original registration information, etc., as needed. Provide relevant evidence and information to relevant administrative agencies and judicial organs.

3. Suspension and termination of services

3.1 If the user has published illegal information, seriously violates social ethics, and other violations of the legal prohibition, Chian Network shall immediately terminate the service to the user.

3.2 Chian Network has the right to terminate the service to the user if the user performs the improper behavior when accepting the Chian Network service. The specific circumstances of the improper conduct shall be expressly agreed in this Agreement or be prohibited by Chian Network's prior notice that the service shall be terminated. Otherwise, Chian Network shall not terminate the provision of services to the User.

3.3 The user provides false registration identity information or implements a violation of this agreement. Chian Network has the right to suspend all or part of the service to the user; Chian Network shall suspend the user and inform the user of the suspension period. The suspension period shall be reasonable and shall be suspended. Chian Network should resume service to users in time.

3.4 Chian Network shall, in accordance with this Article, suspend or terminate the provision of part or all of the services to the User, Chian Network shall bear the burden of proof.

4. User information protection

4.1 Chian Network requires users to disclose their privacy protection policies and personal information utilization policies to users in a clear and easy way, and to take necessary measures to protect the security of users' personal information. .

4.2 Chian Network shall not provide, disclose or share personally identifiable information such as name, personal identification number, contact information, home address, etc. in the user registration data without any user permission, except in the following cases:

4.2.1 The user or user guardian authorized the disclosure of Chian Network;

4.2.2 Relevant legal requirements are disclosed by Chian Network;

4.2.3 The judicial or administrative agency requires Chian Network to provide it on the basis of legal procedures;

4.2.4 Chian Network filed a lawsuit or arbitration with the user in order to protect his or her legitimate rights and interests;

4.2.5 When the user's personally identifiable information is provided in accordance with the legal requirements of the user's guardian.

The ownership of the online game user account is owned by Chian Network. After the user successfully registers, the user's right to use the online game user account is obtained, and any data information generated by the game account and stored in the Chian Network database (including but not limited to account data) The ownership of information, role data information, etc. belongs to Chian Network. Under the premise of full compliance with the agreement, the user has the right to use the agreement specified in the agreement for the data information belonging to his user account during the normal use of the online game.

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 204,053评论 6 478
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 85,527评论 2 381
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 150,779评论 0 337
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,685评论 1 276
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,699评论 5 366
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,609评论 1 281
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,989评论 3 396
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,654评论 0 258
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,890评论 1 298
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,634评论 2 321
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,716评论 1 330
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,394评论 4 319
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,976评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,950评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,191评论 1 260
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 44,849评论 2 349
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,458评论 2 342

推荐阅读更多精彩内容