Stellcrest Games Inc
[GUIDE V.1.0]
COMBAT CONTROL
Master core inputs to dominate. Grasp the tactics behind every key to survive the swarm.
PRIVACY PROTOCOLS
This agreement ensures data security in NeoShot Protocol. We strictly follow laws to safeguard your sensitive intel.
1. DATA HARVEST: We collect essential play data, login credentials, and anti-cheat codes to maintain tactical integrity. 2. DATA UTILIZATION: Intel is used for mechanics, security, and tech support. We do not transmit data to third parties without authorization. 3. RETENTION: Records are kept per legal requirements and purged once mission-critical utility expires. 4. DEFENSE SYSTEMS: We deploy multi-layered encryption and server shielding to prevent data breaches. 5. USER RIGHTS: You may access, modify, or wipe your profile data. Contact HQ tech support for protocol inquiries.