VexGuard FAQ
Direct Answers and Essential Technical Explanations
YES, VexGuard's Evidence customization protocols grant you total command over data acquisition against thieves having your device. This is not about 'dictating' a few settings; it's about deploying a high-velocity, multi-modal capture payload, all optimized with our proprietary upload logic. Maximize your investigative edge with: up to 100 photos, crystal-clear video footage for a full 25 seconds, and an expansive 20 minutes of continuous, optimized audio capture. Itโs high-volume evidence, minus the lag
The free tier is defense. The paid tiers are DOMINATION. Upgrading is the only way to unlock the game-changing, elite feature such as The Zero-Vision Protocol ,This is the 1ms (0.001s) aggressive remote lockdown that turns a stolen device into a non-responsive brick. You also get increased cloud storage capacity, advanced remote wipe options, Evidence Customization (Predator/VanGuard), and prioritized support. You get the full, unrestrained power of the VexGuard Intelligence System.
VexGuard's remote lock specifically Zero-Vision Protocal (ZVP) is a declaration of war against thieves, not a polite lock request. Most apps perform a single lock action, which a determined thief can easily bypass or trick. VexGuard uses a relentless aggressive locking that forces the device to lock every 1 millisecond (0.001 second) when thief tries to interact with the phone, ensuring device is completely unusable as long as the command is active. This high-frequency locking protocal on the screen lock cannot be defeated by human speed or trickery. The ONLY way to stop this loop and make the phone usable again is for YOU, the owner, to manually remote unlock your device in your VexGuard in-app command center found in I LOST DEVICE section. We focus on defense, not passive compliance.
ABSOLUTELY. You must remain signed in as the registered owner. VexGuard's core protection and monitoring protocols are tied to the active user session. When you are logged in, the system is actively guarding your device, listening for triggers, and ready to execute remote commands. Logging out kills the defense system thus why if you manually try to log out, we force you to confirm your identity through re-authentication (PIN, Password, Pattern) because compromise is not an option. Stay logged in, stay protected.
VexGuard operates on a global threat matrix and supports 13 core languages: ๐ฌ๐ง English, ๐ช๐ธ Spanish, ๐ซ๐ท French, ๐ธ๐ฆ Arabic, ๐จ๐ณ Chinese, ๐ฎ๐ณ Hindi, ๐ง๐ท Portuguese (Brazil), ๐ท๐บ Russian, ๐ฉ๐ช German, ๐ฏ๐ต Japanese, ๐ฐ๐ท Korean, ๐ฎ๐น Italian, and ๐น๐ฟ Swahili. You can switch the language at any time for maximum operational clarity.
This is your second layer of defense. To access or change VexGuard's 'Traps' (the trigger center), you must confirm your identity using a biometric scan, PIN, or pattern. This prevents a casual snooper or a low-level thief from unauthorized changes to your security protocols or disarming your defenses.
Once the alarm sounds, it's in full deterrence mode. To silence it, you must open the VexGuard app and immediately confirm your identity in the 'VexGuard Traps' (Triggers Center). This forces a biometric/PIN check to ensure the owner is disabling the system, not the thief. This security measure is included for all users (free tier) for maximum protection.
YES. Due to modern Android security and battery optimization protocols, you must open VexGuard at least once after every device reboot or restart. This action re-initializes and activates VexGuard's core background defense services, ensuring all monitoring and remote control systems are live.
Due to aggressive battery optimization feature in some device manufacturers' skins or older Android versions. When you 'Clear All' recent apps, the OS may aggressively force-stop VexGuard's background service. We recommend you swipe VexGuard away from the recents list instead of using a 'Clear All' button. We are deploying an update to mitigate this aggressive closure, also keep in mind VexGuard may never stay on recent apps section for security reasons but it's functionality will not be affected you can easyly open the app again and continue where you left
AFFIRMATIVE. We said it once, we'll say it again: VexGuard is absolutely, 100% ad-free for every user, on every tier. Your security is paramount, not ad revenue.
Absolutely. All sensitive data is secured at rest using military-grade encryption. Evidence files (photos, video, audio) are automatically encrypted with AES with IV randomization before they even leave your device for secure cloud upload. You have complete digital dominion.
VexGuard is a self-sufficient powerhouse. All core defensive functions (device lock, alarm, local evidence capture, and sensor triggers) operate completely autonomously without network access, storing all data securely in local encrypted storage. Once a connection is restored, the system executes an immediate, prioritized cloud sync protocol.
Remote Wipe is the absolute last resort. The command is transmitted via a highly prioritized Cloud Messaging channel. It is contingent on two factors: the device is powered on, and the VexGuard app maintains Device Administrator rights. If successful, it triggers a factory reset of the device, obliterating all personal data to ensure zero compromise.
VexGuard is built for immediate action. Capture velocity depends on your device's processor speed and I/O performance. However, VexGuard is aggressively optimized to capture all available evidence (photos, video, audio, location) and initiate the cloud sync protocol with ruthless speed, giving you real-time data on the theft event.
Due to Android OS Security Protocol, third-party applications like VexGuard are strictly prohibited from accessing failed biometric authentication events (like fingerprint or face unlock attempts). This is a system-level security layer we cannot bypass, ensuring no app can covertly monitor your biometric use.
No. The VexGuard Intelligence System is built for instant action through its fully secured in-app command center. You can quickly use any nearby phone with VexGuard installed to track your devices. A full web dashboard for max flexibility is in development and coming soon.
There is no limit on the number of devices you can link! As long as each device is signed in with the same Google Account used to activate VexGuard, they are instantly protected and managed under your command center. Deploy the protection everywhere.
The VexGuard Intelligence System is designed to handle subscription transitions intelligently. You are free to upgrade or downgrade 24/7. IMPORTANT: You must cancel the previous plan on your Google Play Store account. If you momentarily have multiple active plans, VexGuard will automatically prioritize the higher plan, ensuring you always receive the maximum features you've paid for.
VexGuard is ruthless. The system captures up to 100 photos, 20 minutes of ambient audio, AND up to 25 seconds of critical video evidence immediately upon trigger. We're actively working on an update to push video capture up to a 10-minute maximum for ultimate proof acquisition.
Currently, VexGuard is focused on dominating the Android ecosystem to deliver the absolute best, deepest security possible. No iOS support for now, but the expansion protocol is under consideration. We build deep, not wide, first.
The performance of features like Pocket Guard and Anti-Snatch is tied directly to the quality and sensitivity of your device's internal motion sensors. Every device is unique. We are developing a future update to allow for custom sensitivity adjustment for these sensor-based features to fine-tune the trigger protocol for your specific hardware.
Evidence sync is an immediate priority protocol once network access is restored. The system uses a seamless hybrid backend, bridging local secure storage with the secure cloud. Sync speed is limited only by your internet connection. We don't waitโwe transmit.
The local encrypted storage can securely buffer a massive volume of evidence, ensuring zero data loss during offline operations. It's designed to operate for extended periods without network access, storing all logs, location, and metadata until the cloud sync window opens. Your data is safe and captured, always.
VexGuard employs an intelligent, low-power monitoring protocol. It only performs heavy operations (camera, mic, GPS) when a theft trigger is actively activated (e.g., incorrect PIN, unplugged from charge) or during a manual remote evidence collection command. The rest of the time, it's a dormant, high-efficiency sensor system, minimizing battery impact while vigilantly waiting for unusual activity that indicates your device is at risk.
YES. This is a core feature. Removing or swapping the SIM card instantly triggers the 'SIM Guard' protocol, which locks the device, sounds the alarm, and captures immediate evidence. Since VexGuard communicates via data (secure cloud), this action doesn't interrupt command and control.
Absolutely. From your command center (another VexGuard device), you can issue an immediate 'Lockdown' command to remotely freeze the device and prevent any use. Simultaneously, you can initiate the 'Acoustic Deterrent' (alarm/scream) to maximize attention and recovery chance. This is executed even if the thief disables the screen lock.
Your storage capacity is dependent on your active subscription tier (Sentry, Guardian, Predator). While not technically infinite, the capacity for the highest tier is designed to handle thousands of high-resolution photo/audio evidence dumps. We use a rolling deletion protocol for the oldest data, but you can always manually download and archive your evidence.
To function as a true anti-theft system, VexGuard requires deep access. Permissions for Camera, Microphone, Location, and Device Administrator are non-negotiable. Without them, the system cannot capture irrefutable evidence, locate the device, or enforce the lockdown/wipe protocols. Your privacy is secured by our policy; the threat is external.
VexGuard is registered as a Device Administrator during setup. This status prevents unauthorized uninstallation directly from the app drawer or Settings > Apps list. To remove VexGuard, the thief would first need to know your security PIN/password to manually revoke the Administrator statusโa major deterrent.
YES. The VexGuard protocol provides full location history and real-time tracking of your stolen device. Every time a theft trigger is activated (e.g., incorrect PIN or remote command), the system transmits the exact GPS coordinates to your command center. This location data is securely logged and immediately accessible, giving you the critical intel needed for recovery.