暗黑血源

Legal related-copyright notice

Without the written permission of the person, any unit orindividual shall not use, copy, modify, transcribe, disseminate or bundle anypart of the above-mentioned products, services, information or materials in anyway or for any reason.

If you have any questions, please email:trmqwueqxyc@sina.com

Lu Dafang owns intellectual property such as copyright,including but not limited to the entire content of the product or service thatis issued or jointly issued with a partner company, and is protected by law.

Without the written permission of the owner, no unitorindividual may use, copy, modify, copy or transmit any part of the aboveproducts, services, information, or materials in any way or for any reason.

Private Policy

Provide services to you.

Lu Dafang regards user information security and privacyprotection as his "lifeline." We adhere to the "everything basedon user value" philosophy, and strive to improve the transparency ofinformation processing, enhance your convenience of information management, andprotect your information and communication security.

Lu Dafang strictly abides by laws and regulations andfollows the following privacy protection principles to provide you with saferand more reliable services:

1,

Safe and reliable: We make every effort to prevent yourinformation from being leaked, damaged or lost through reasonable and effectiveinformation security technology and management processes.

2,

Self-selection: We provide you with convenient informationmanagement options so you can make the right choices and manage your personalinformation.

3,

Protecting communication secrets: We strictly abide by laws andregulations, protect your communication secrets, and provide you with securecommunication services.

4,

Reasonable: In order to provide better service to you and otherusers, we only collect the necessary information.

5,

Clear and transparent: We strive to use a concise statement tointroduce you to the privacy policy so that you can clearly understand how ourinformation is handled.

6,

Incorporate privacy protection into product design: We integratevarious concepts such as law, product and design into all aspects of product orservice development, and incorporate the concept of privacy protection.

This Privacy Policy mainly explains to you:

What information we collect;

The purpose of our collection of information;

Your rights.

I hope that you read the Privacy Policy (hereinafter referred toas "this policy") to learn more about how we collect and useinformation so that you can better understand our services and make appropriatechoices.

By using Lu Dafang 's services, you are agreeing to what we havedescribed in this policy. Terms used in this policy have the same meanings asin the User Agreement unless otherwise agreed.

If you have any questions, please contact us.

First, the information we collect

We collect only the information necessary to achieve productfunctionality based on legal, justified, and necessary principles.

1.1

Information that you provide when you use our services

1.1.1 Information you fill out when you register your account.

For example, the nickname and mobile number you filled in whenyou signed up for an account.

1.1.2 Information that you upload when you use the service.

For example, when you use an app, upload an avatar, sharedphoto.

1.1.3 Information submitted by you through our customer serviceor attending our events.

For example, a questionnaire you fill out when participating inour online event may include your name, phone number, home address, and more.

Some of our services may require you to provide specificpersonally sensitive information to achieve specific functions. If you choosenot to provide this type of information, you may not be able to use certainfeatures in the service, but it will not affect your use of other features inthe service. By providing your personally sensitive information, you consent tothe processing of your personally sensitive information in accordance with thepurposes and methods described in this policy.

1.2

Information we get when you use the service

1.2.1 Log information. When you use our services, we mayautomatically collect relevant information and store it as service loginformation.

(1) Equipment information. For example, device model, operatingsystem version, unique device identifier, battery, signal strength, and more.

(2) Software information. For example, the version number of thesoftware, the browser type. To ensure the security of the operating environmentor to provide services, we collect information about the mobile apps and othersoftware you use.

(3) IP address.

(4) Service log information. For example, information yousearch, view, service failure information, referral URLs, etc. when you use ourservices.

(5) Communication log information. For example, the account,communication time, and duration that you used to communicate when using ourservices.

1.2.2 Location information. When you use location-relatedservices, we may record the location of your device to provide you withrelevant services.

(1) When you use the service, we may obtain your geographiclocation information through IP address, GPS, WiFi or base station;

(2) The information provided by you or other users when usingthe service may include information about your location, such as theinformation about your area that may be included in the account information youprovided, and the geo-tagging information contained in photos shared by you orothers. ;

1.2.3 Other relevant information. To help you make better use ofour products or services, we collect relevant information. For example, wecollect buddy lists, group list information, and voiceprint feature valueinformation. To ensure that you can use our services to reach people you know,if you choose to enable the Import Contacts feature, we may encrypt yourcontact's name and phone number and collect only the encrypted information.

1.3

Information shared by other users contains your information

For example, photos posted by other users or shared videos maycontain your information.

1.4

Information obtained from third-party partners

We may obtain information that you generate or share when youuse a third-party partner service. For example, when you use your account tosign in to a third-party partner service, we'll get the name and login time ofyour third-party partner service, so you can manage it. Please read carefullythe user agreement or privacy policy of the third party partner service.

Second, how do we use the information we collect?

We strictly abide by the laws and regulations and the agreementwith the users, and use the collected information for the following purposes.If we use your information beyond the following purposes, we will explain it toyou again and obtain your consent.

2.1

Provide services to you.

2.2

Meet your individual needs. For example, language settings,location settings, personalized help services.

2.3

Product development and service optimization. For example, whenour system fails, we record and analyze the information generated by the systemfailure to optimize our services.

2.4

Security. For example, we use your information forauthentication, security, anti-fraud monitoring, archive backup, customersecurity services, and more. For example, security software that you downloador install detects malware or viruses or identifies fraudulent information foryou.

2.5

Recommend ads, news, and more that may be of interest to you.

2.6

Assess and improve the effectiveness of our advertising andother promotions and promotions.

2.7

Management software. For example, perform softwarecertification, software upgrades, and the like.

2.8

Invite you to participate in a survey about our services.

In order to give you a better experience, improve our servicesor other uses that you agree to, we may use the information collected throughcertain services for our other services, subject to relevant laws andregulations. For example, use information about one of our services for anotherservice to show you personalized content or ads, for user research analysis andstatistics.

To ensure the security of our services and to help us betterunderstand how our applications are performing, we may record information suchas how often you use the application, fault information, overall usage,performance data, and the source of the application. We do not combine theinformation we store in the analysis software with the personally identifiableinformation you provide in the application.

How do we use cookies and related technologies?

We or our third-party partners may collect your information byplacing secure cookies and related technologies in order to provide you with amore personalized user experience and service. We will strictly requirethird-party partners to comply with the relevant provisions of this policy.

You can also manage your cookies through your browser settings.However, please note that if you disable cookies, you may not be able to enjoythe best service experience and some services may not work properly. If youwould like more information on the security of cookies, please see the CookiePolicy Note.

Fourth, the information you share

You can share your information with your friends, family andother users through our services. For example, the text and photos you sharepublicly on the WeChat circle of friends. Please note that this may includesensitive information such as your personally identifiable information,personal property information. Please carefully consider disclosing yourrelevant personal sensitive information.

You can control the scope of your shared information through theprivacy settings in our services, or you can delete your publicly sharedinformation through the settings in the service or the guidelines we provide.However, please note that this information may still be stored independently byother users or non-associated third parties not under our control.

How do you manage your information?

5.1

You may access, modify and delete the registration informationand other personal information you provide while using our services, or you mayfollow the notice guidelines to contact us. The scope and manner in which you access,modify, and delete personal information will depend on the specific service youuse. For example, if you want to stop sharing your location information whenusing location-related services, you can stop sharing by using the mobile phonelocation shutdown feature, software and hardware service provider andcommunication service provider shutdown. I suggest you read the relevantguidelines carefully. .

5.2

We will collect and use your information only as described inthis policy for the functionality of our products or services. If you find thatwe have violated laws, administrative regulations or the agreement of bothparties to collect and use your personal information, you can ask us to deleteit. If you find that your personal information collected and stored by us isincorrect, you can also ask us to correct it. Please contact us through thecontact details listed in this policy.

5.3

When you access, modify, and delete information, we may ask youto authenticate to keep your account secure.

5.4

Please understand that due to technical limitations, legal orregulatory requirements, we may not be able to meet all of your requirementsand we will respond to your request within a reasonable timeframe.

6. Information we share

We strictly restrict the sharing of information in accordancewith laws and regulations, such as:

6.1

We may share your personal information with third parties withyour prior consent;

6.2

For the sole purpose of external processing, we may work withthird party partners (third party service providers, contractors, agents,advertising partners, app developers, etc., for example, to provide email orpush notifications on our behalf. Providers, map service providers that provideus with location services) (they may not be in your jurisdiction) share yourpersonal information and let them follow our instructions, privacy policies andother relevant confidentiality and security measures. Process the aboveinformation and use it for the following purposes:

6.2.1 provide you with our services;

6.2.2 achieve the stated purpose of the “How we use theinformation collected” section;

6.2.3 fulfill our obligations under the User Agreement or thisPolicy and exercise our rights;

6.2.4 Understand, maintain and improve our services.

If we share your information with the above-mentioned thirdparties, we will use encryption, anonymization and other means to protect yourinformation.

6.3

As our business continues to develop, when mergers,acquisitions, asset transfers, etc. result in the sharing of your personalinformation with third parties, we will inform you of the relevant situation bymeans of push notifications, announcements, etc., in accordance with laws andregulations and not less than The standards required by this policy continue toprotect or require new administrators to continue to protect your personalinformation.

6.4

We will use the information we collect for big data analysis.For example, we use the information we collect to analyze urban thermograms orindustry insight reports that do not contain any personal information. We maydisclose and share with our partners information that is processed withoutpost-identification content to understand how users use our services or toinform the public about the overall usage trends of our services.

6.4

We may disclose your personal information for the followingpurposes:

6.5.1 Comply with applicable laws and regulations and otherrelevant regulations;

6.5.2 comply with the provisions of court decisions, rulings orother legal procedures;

6.5.3 comply with the requirements of relevant governmentagencies or other legally authorized organizations;

6.5.4 We have reason to believe that we need to comply withrelevant laws and regulations;

6.5.5 Reasonable and necessary use for the protection of thepersonal and property safety or other legal rights of our customers, us or ouraffiliates, other users or employees for the purpose of implementing therelevant service agreements or this policy, safeguarding the public interest.

7. Information we may send you

7.1

Information push

We may send you emails, text messages, news or pushnotifications when you use our services. You can choose to unsubscribe on yourdevice by following our tips.

7.2

Service related announcement

We may issue service-related announcements to you when necessary(for example, when a service is suspended due to system maintenance). You maynot be able to cancel these announcements that are related to the service andthat are not advertising.

Eight, the location and duration of the stored information

8.1

Location where information is stored

We comply with the laws and regulations and store the personalinformation collected by users in China.

8.2

Term of information stored

In general, we retain your personal information for the shortestperiod of time necessary to achieve its purpose. However, in the followingcases, we may change the storage time of personal information due to legalrequirements:

8.2.1 To comply with applicable laws and regulations and otherrelevant regulations;

8.2.2 to comply with court decisions, rulings or other legalprocedures;

8.2.3 in order to comply with the requirements of relevantgovernment agencies or statutory authorized organizations;

8.2.4 We have reason to believe that we need to comply withrelevant laws and regulations;

8.2.5 The purpose reasonably necessary to protect the personaland property safety or other legal rights of our customers, us or ouraffiliates, other users or employees for the purpose of implementing therelevant service agreements or this policy, safeguarding the public interest.

In the event that our products or services cease to operate, wewill notify you by, for example, push notifications, announcements, etc., anddelete or anonymize your personal information within a reasonable period oftime.

Nine, information security

We provide appropriate security for your information to preventloss, misuse, unauthorized access or disclosure.

9.1

We strictly abide by laws and regulations to protect users'communication secrets.

9.2

We will use various security measures to ensure the security ofinformation within a reasonable level of security. For example, we useencryption (eg, TLS, SSL), anonymization, and other means to protect yourpersonal information.

9.3

We establish specialized management systems, processes andorganizations to ensure information security. For example, we strictly limitthe range of people accessing information and require them to comply withconfidentiality obligations and conduct reviews.

9.4

In the event of a security incident such as a personalinformation disclosure, we will initiate an emergency plan to prevent theexpansion of security incidents and inform you by push notifications,announcements, etc.

Ten, advertising

We may use your relevant information to provide you with adsthat are more relevant to you on relevant websites, apps and other channels.You can learn more about the ad page.

Eleven, protection of minors

We attach great importance to the protection of personalinformation of minors. In accordance with the relevant laws and regulations, ifyou are a minor under the age of 18, you should obtain the consent of yourparent or legal guardian before using Tencent's services. If you are a guardianof a minor, please contact us through the contact details in Section 13 whenyou have questions about the personal information of the minor you aremonitoring.

Twelve, the scope of application

This policy applies to all of our services. However, someservices have their own specific privacy guidelines/statements that morespecifically describe how we process your information in the service. In theevent of any inconsistency between this policy and the privacyguidelines/claims for a particular service, please refer to that particularprivacy guide/declaration.

Please note that this policy does not apply to services providedby other companies or individuals. For example, you can use a WeChat account tolog in to other companies or individuals.

Your use of such third party services is subject to its PrivacyPolicy (not this Policy) and you will need to read the policies carefully.

Thirteen, contact us

If you have any questions about this policy or other relatedmatters, please contact us through the contact information indicated at thebottom of the official website.

We will review the issue as soon as possible and respond within30 days of verifying your user status.

Fourteen, change

We may revise this policy in due course. If such changes resultin a substantial derogation of your rights under this Policy, we will notifyyou by prompting you at the prominent location on the page, by sending you anemail, etc., before the change takes effect. In such a case, if you continue touse our services, you agree to be bound by the revised policy.

You can share your information with your friends, family andother users through our services. For example, the text and photos you sharepublicly on the WeChat circle of friends. Please note that this may includesensitive information such as your personally identifiable information,personal property information. Please carefully consider disclosing yourrelevant personal sensitive information.

How do you manage your information?

Your use of such third party services is subject to its PrivacyPolicy (not this Policy) and you will need to read the policies carefully.

For example, a questionnaire you fill out when participating inour online event may include your name, phone number, home address, and more.

Incorporate privacy protection into product design: We integratevarious concepts such as law, product and design into all aspects of product orservice development, and incorporate the concept of privacy protection.

(1) Equipment information. For example, device model, operatingsystem version, unique device identifier, battery, signal strength, and more.

Information that you provide when you use our services

Security. For example, we use your information for authentication,security, anti-fraud monitoring, archive backup, customer security services,and more. For example, security software that you download or install detectsmalware or viruses or identifies fraudulent information for you.

User Agreement

Part I Important

This "Online Game End User License Agreement"(hereinafter referred to as "Agreement") is the user's (individual orsingle entity, hereinafter referred to as "User") and Lu Dafangregarding this online game (including any modification of the online game, Thelegal agreement for the use of the update, all previous versions and subsequentversions, hereinafter referred to as "online games".

1. Agreement content

1.1 main content:

The first part of the important tips; the second part of therights statement; the third part of the necessary clauses; the fourth mainterms; the fifth part of the user code;

1.2 Change content:

All of the above, Lu Dafang reserves the right to make changesbased on operational needs. All changes and updates will take effectimmediately after the end of the objection period specified by Lu Dafang;

1.3 new content:

Other rules that Lu Dafang publishes periodically or irregularlyaccording to operational needs, including but not limited to other officialinformation such as forum forum rules, code of conduct, activity rules,definition interpretation, etc.

Please note that in view of the user's habit of using the onlinegame service, the user is obliged to re-read the entire contents of the enduser license agreement on a monthly basis from the date of using the Lu Dafangservice. In view of the above agreement, the user is not satisfied with theperformance. Those who have such obligations are not entitled to object to thelegal effect of the relevant provisions without knowing the above.

2. The obligations of Lu Dafang

2.1 The legal Lu Dafang's obligation to take reasonablecare to the attention of the user will be achieved as follows:

In this agreement, Lu Dafang reminds the user of the relevantterms in a reasonable manner, such as underline and red mark, which are enoughto draw the user's attention. (It is important to emphasize that it is notlimited to the user should pay special attention to any unspecified “including”", "disclaimer", "not", "reject" and otherterms of similar terms), these terms shall be applied to this Agreement to thefullest extent permitted by Chinese law. Unless the user accepts all the termsof this agreement, he or she is not authorized to install, copy, access LuDafang related websites, recharge, run client software or otherwise use onlinegames.

3. User's rights

In case of any objection to the above mentioned terms and anycontent of this agreement, the user has the right to refuse to click to agreeor to express an objection to Lu Dafang by phone or email within 30 days afterany agreement is updated, changed or modified.

Any of the following actions of the user will be deemed as theuser's complete recognition of the agreement. This User Agreement will takeeffect immediately and be fully legally binding on Lu Dafang and the user: (1)Click on any part of registration, download, use, etc. (2) use the online gameproducts and services provided by Lu Dafang in any way that may or may haveinteracted with the online game; (3) not call or within 30 days after theupdate, change or modification of the agreement, rules, etc. Send an email to LuDafang to object.

4. User's approval

In view of the fact that Lu Dafang has fulfilled its obligationsunder the format clauses, the above actions of the user will be deemed andshould be regarded as the legality and validity of the terms that the user hasfully paid attention to and agreed to all the terms of this agreement,especially the user's attention. The User shall not claim or require the Courtor any other third party to confirm that the Terms are illegal or invalid onthe grounds that Lu Dafang does not promptly alert the user to the format termsor does not fulfill the stated obligation on the User's request.

5. Minors pay attention to the terms

Minors should review and accept this agreement in the company ofa legal guardian. For minors under the age of 14, you must apply forregistration in the name of a legal guardian by their legal guardian. Minor usersshould use "online games" and conduct online games to a reasonableextent. Lu Dafang has the right to impose relevant restrictions in accordancewith the law.

Part II Statement of Rights

1. Intellectual property

This product and the instruction manual are protected bycopyright law. All programs and graphic contents may not be copied, reproducedor modified in whole or in part by any means without the written permission ofthe authorized party and the operator. All related product names, trademarks,brands and pictures on this product and in the packaging and manuals are ownedby the authorized party or Lu Dafang and are the property of their respectiveowners.

The entire content of online games (including but not limited toany computer code, game characters, game character names, game characterinformation, story background, plot language, place name settings, task design,economic system, trading system, production building system, social system Theintellectual property rights of the confrontation function, character image,sound effect, map props, motion rendering, team system, game concept, art work,sound effects, music, audio and video, documentation, and game client andserver software are owned by the authorized party. All rights to perform thisAgreement are legally available based on authorization.

2. game account

The ownership of the online game user account is owned by LuDafang. After the user successfully registers, the user's right to use theonline game user account is obtained, and any data information generated by thegame account and stored in the Lu Dafang database (including but not limited toaccount data) The ownership of information, role data information, etc. belongsto Lu Dafang. Under the premise of full compliance with the agreement, the userhas the right to use the agreement specified in the agreement for the datainformation belonging to his user account during the normal use of the onlinegame.

Virtual item

Virtual items in online game products and services, includingbut not limited to ingots, coins, gold, game coins, virtual equipment, virtualitems, etc., are owned by Lu Dafang and are generated based on the virtual itemand stored in the Lu Dafang database. The ownership of any data information(including but not limited to virtual item data information, grade item datainformation, etc.) belongs to Lu Dafang. Under the premise of full compliancewith the agreement, the user has the right to use the agreement specified inthe agreement for the data information belonging to his virtual item during thenormal use of the online game.

Part III Essential Terms

1. Account registration

1.1 The user promises to register as a Lu Dafang user in histrue identity, and to ensure that the personally identifiable informationprovided is true, complete and valid, and bears corresponding legalresponsibility for the information provided in accordance with legal provisionsand mandatory terms.

1.2 After the user registers as a Lu Dafang user in his or herreal identity and needs to modify the personally identifiable informationprovided, Lu Dafang shall provide the service in a timely and effective manner.

2. User account usage and custody

2.1 According to the mandatory provisions, Lu Dafang has theright to review whether the identity information provided by the userregistration is true and effective, and should actively take reasonablemeasures such as technology and management to ensure the security and validityof the user account; the user is obliged to keep it safe. Account and password,and use their account and password correctly and securely. If any party failsto perform the above obligations resulting in the loss of the account password,the account is stolen, etc., causing damage to the civil rights of the user andothers, the legal liability arising therefrom shall be borne.

2.2 The user has rights and assumes responsibility for theactions of the account held after login.

2.3 If the user finds that his account or password has beenillegally used by others or has abnormal use, he shall promptly notify LuDafang according to the processing announced by Lu Dafang and have the right toinform Lu Dafang to take measures to suspend the login and use of the account.

2.4 Lu Dafang shall take measures to suspend the login and useof the user account according to the user's notice. Lu Dafang shall require theuser to provide and verify the personal valid identity information consistentwith the registered identity information.

2.4.1 Lu Dafang verifies that the personal valid identityinformation provided by the user is consistent with the registered identityinformation, and shall take measures to suspend the login and use of the useraccount in a timely manner.

2.4.2 Lu Dafang violates the agreement of 2.4.1. If the measuresare not taken in time to suspend the login and use of the user account, andtherefore cause losses to the user, they shall bear the corresponding legalresponsibilities.

2.4.3 Lu Dafang has the right to refuse the user's request ifthe user does not provide his or her personal valid ID or if the personal validID provided by the user is inconsistent with the registered identityinformation.

2.5 In order to maintain the legitimate rights and interests ofthe user and provide Lu Dafang with personal valid identity informationconsistent with the registered identity information, BobWalker shall providethe user with the necessary assistance and support for the account registrantcertificate, original registration information, etc., as needed. Providerelevant evidence and information to relevant administrative agencies andjudicial organs.

3. Suspension and termination of services

3.1 If the user has published illegal information, seriouslyviolates social ethics, and other violations of the legal prohibition, LuDafang shall immediately terminate the service to the user.

3.2 Lu Dafang has the right to terminate the service to the userif the user performs the improper behavior when accepting the Lu Dafangservice. The specific circumstances of the improper conduct shall be expresslyagreed in this Agreement or be prohibited by Lu Dafang's prior notice that theservice shall be terminated. Otherwise, Lu Dafang shall not terminate theprovision of services to the User.

3.3 The user provides false registration identity information orimplements a violation of this agreement. Lu Dafang has the right to suspendall or part of the service to the user; Lu Dafang shall suspend the user andinform the user of the suspension period. The suspension period shall bereasonable and shall be suspended. Lu Dafang should resume service to users intime.

3.4 Lu Dafang shall, in accordance with this Article, suspend orterminate the provision of part or all of the services to the User, Lu Dafangshall bear the burden of proof.

4. User information protection

4.1 Lu Dafang requires users to disclose their privacyprotection policies and personal information utilization policies to users in aclear and easy way, and to take necessary measures to protect the security ofusers' personal information. .

4.2 Lu Dafang shall not provide, disclose or share personallyidentifiable information such as name, personal identification number, contactinformation, home address, etc. in the user registration data without any userpermission, except in the following cases:

4.2.1 The user or user guardian authorized the disclosure of LuDafang;

4.2.2 Relevant legal requirements are disclosed by Lu Dafang;

4.2.3 The judicial or administrative agency requires Lu Dafangto provide it on the basis of legal procedures;

4.2.4 Lu Dafang filed a lawsuit or arbitration with the user inorder to protect his or her legitimate rights and interests;

4.2.5 When the user's personally identifiable information isprovided in accordance with the legal requirements of the user's guardian.

The ownership of the online game user account is owned by LuDafang. After the user successfully registers, the user's right to use theonline game user account is obtained, and any data information generated by thegame account and stored in the Lu Dafang database (including but not limited toaccount data) The ownership of information, role data information, etc. belongsto Lu Dafang. Under the premise of full compliance with the agreement, the userhas the right to use the agreement specified in the agreement for the datainformation belonging to his user account during the normal use of the onlinegame.

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 211,743评论 6 492
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 90,296评论 3 385
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 157,285评论 0 348
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 56,485评论 1 283
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 65,581评论 6 386
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 49,821评论 1 290
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 38,960评论 3 408
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 37,719评论 0 266
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 44,186评论 1 303
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 36,516评论 2 327
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 38,650评论 1 340
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 34,329评论 4 330
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 39,936评论 3 313
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 30,757评论 0 21
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,991评论 1 266
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 46,370评论 2 360
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 43,527评论 2 349

推荐阅读更多精彩内容