Security begins with knowing how developers gather and share your info. Information privacy and security practices could differ depending on your use, region, and age. The developer supplied this info and may update it over time.This extra protection layer makes sure that regardless of whether a password is compromised, unauthorized entry stays pre