
This, in addition to being a free acquisition software, caused it to be downloaded by hundreds of people, who saw in Bonzi a kind of virtual friendship.

Up to this point the Bonzi software still seems harmless, and that brings us to the next question: #BONZI BUDDY FOR ANDROID FREE# How did the BonziBuddy become a threat to computers? The BonziBuddy Software had a feature that made it difficult for the user to control: it was the first virtual assistant completely independent of Microsoft tools, or any other program. It was, in a certain way, autonomous, and by working with an internet connection, it was able to mutate in conjunction with any configuration and update that its programmers added to it.

Thus, progressively Bonzi was acquiring more invasive, intrusive and even manipulative characteristics, which had as main purpose to suggest the user to buy other products from the Bonzi software developers, or paid features of the same BonziBuddy. It is not known if the programmers planned this turn since the creation of the assistant, or if they decided to give it when they realized that they could take advantage of its growing popularity to generate greater profits.

Once Bonzi Software undertook its advertising side, it used a series of resources to carry out its task without falling into evidence: The truth is that his striking purple monkey began to run so many abuses that it became little by little to a nightmare for all its users. It offered a tool of Firewall and of acceleration of the Internet that modified the defenses of Windows. It threw false warning windows, almost identical to those of Windows, to make the user believe that he needed to protect his computer by buying Bonzi’s tools.It brought up Bonzi advertising pop-ups, which were not labeled as advertising, but appeared to be alternate functions of the program, and they also came with a fake “X” so that the person could not close the window in the traditional way.Registered and transmitted to its programmers the activity of the user’s computer without requesting their permission.Requested an online registration in which personal information was demanded such as the full names, age and address of the users.
