Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is the “Send Me to Heaven” App the Best Technology Prank Ever? [VIDEO]

b2ap3_thumbnail_applications_and_pranks_400.jpgIf someone asked you to throw your expensive smartphone high up into the air and risk dropping it, just for the fun of it, you would probably say no. However, for the hundreds of thousands of smartphone users who have downloaded an app designed to do just that, they may have fallen for one of the best (or dumbest) technology pranks of all time.

The app we’re referring to is S.M.T.H. (Send Me to Heaven) and it’s found on Google Play. However, unlike Google, Apple isn’t falling for it. Apple actually banned the game from their App Store, claiming that it was “encouraging behavior that could result in damage to the user’s device.”

To Apple’s credit, they’re not wrong, as evidenced by a WIRED interview of the app’s creator, Petr Svarovsky. In the interview, Svarovsky admitted that he had “hoped to have people shatter as many iPhones as possible.” Why would someone want to do such a thing?

Unlike your average mischief-maker who wants to watch the world burn just for the fun of it, Svarosky’s motivation is to get back at people who buy expensive devices as a status symbol. He admitted as much to WIRED, “The original idea was to have very expensive gadgets, which people in certain societies buy just to show off, and to get them to throw it.” One can only imagine the devastation Svarsoky could unleash upon the world if he designed the S.M.T.H. app for smart TVs.

How Does the S.M.T.H. Work?
Like all great mobile gaming apps, S.M.T.H. is ridiculously simple. With the app activated, you simply chuck your smartphone into the air and catch it. After it lands safely in your hands, you’ll then check the screen to see how high your throw was. As seen in this tutorial video:

To give you the motivation to keep throwing your smartphone and putting it at further risk, the app registers the throw’s height and uploads the result to leaderboards such as; World Top 10, Week Top 10, Day Top 10, Local Top 10 (national) and Facebook Friends lists.

Safe to say, there has been many phones destroyed because of this game, earning it the infamous title, “the last game your phone will ever play.” However, for those who aren’t all that concerned about breaking their phone, S.M.T.H. actually makes for a fun and competitive gaming experience where you have to get creative in order to break your old record. Take it from these guys using rubber bands to launch their phones and a blanket to catch it:

What do you think about S.M.T.H.? Does it seem like a fun and exhilarating way to do something new with your smartphone? Are you going to give it a try, or perhaps recommend it to a friend as a practical joke? Share with us your thoughts and high score (well, maybe not) in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Chrome Gadgets Virtualization Social Media Tech Term Saving Money Holiday Managed IT Services Automation Managed Service Microsoft Office Facebook Computers Artificial Intelligence Cybercrime Operating System Internet of Things Wi-Fi BYOD Health Mobile Device Management Networking IT Support Hacking Telephone Systems Information Alert Covid-19 Information Technology Spam Managed Service Provider Remote Office 365 BDR Recovery Employer-Employee Relationship Bandwidth Router Social Engineering Mobility Law Enforcement App History Mobile Computing Data Breach Password Human Resources Application Money Encryption Applications Remote Monitoring Big Data Blockchain Data Storage Paperless Office Office Tips Private Cloud Patch Management Training Managed IT VPN Apps Remote Computing Mobile Office How To Government Wireless Flexibility Vulnerability Windows 7 Marketing Word WiFi Gmail Bring Your Own Device IT solutions Entertainment Infrastructure Settings Data Management Voice over Internet Protocol Servers Website Work/Life Balance Budget Two-factor Authentication Data Security Mouse HaaS Google Drive Avoiding Downtime Risk Management Hacker Vendor Software as a Service Conferencing Telephone System Staff Managed Services Display Machine Learning The Internet of Things Lithium-ion battery Save Time Scam Connectivity Remote Work Employee/Employer Relationship Cleaning Vendor Management Firewall RMM USB Virtual Reality Apple End of Support Education Physical Security Data Protection Social Safety User Error Sports HIPAA Redundancy Meetings Keyboard Biometrics Virtual Assistant Virus Authentication Virtual Desktop Managed Services Provider Document Management Database Unified Threat Management Computer Accessories Solid State Drive DDoS Wireless Technology Remote Workers Business Intelligence How to Downtime SharePoint Update Worker Processor Audit IT Management Data storage Google Docs Automobile Printer Identity Theft Customer Service Botnet Hard Drive Environment Bluetooth IT Plan Computing Infrastructure Going Green Fax Server Computing Unsupported Software Augmented Reality Charger SaaS Fraud IT Consultant Battery Shadow IT Remote Worker Compliance OneNote Legal Computer Care Humor Digital Signage Current Events Cryptocurrency Network Congestion eWaste Internet Exlporer Telephony Samsung Comparison PDF Procurement Value Workplace Strategy Net Neutrality CES Electronic Medical Records Wearable Technology Proactive IT Spam Blocking Help Desk Retail Hard Drives Instant Messaging Printing Business Technology Content Management Best Practice Hiring/Firing Access Control YouTube Robot Excel Black Market Point of Sale Personal Tip of the week Business Owner Cryptomining webinar Emergency Employer Employee Relationship NarrowBand Workforce Supply Chain Management Professional Services Public Cloud Virtual Private Network User Batteries PowerPoint Search Assessment Windows Media Player Cables Monitoring Windows 8.1 Digitize Windows Server 2008 iPhone Nanotechnology Telecommuting Tools Science Windows Server 2008 R2 Project Management Managing Stress Television Cortana Customer relationships Email Best Practices IT Assessment Manufacturing Files Digital Signature Warranty Cameras Distributed Denial of Service Chromecast Customer Relationship Management Analyitcs Managed IT Service Security Cameras Public Computer HVAC Google Apps Computer Tips Analysis Uninterrupted Power Supply Virtual CIO Programming OneDrive Regulations Biometric Security Colocation Transportation Administrator Rootkit Devices Peripheral Computer Fan Using Data Enterprise Content Management Monitor Digital Security Cameras Accountants Antivirus Copiers 5G Workers MSP Benefits Microchip Printer Server Thought Leadership Credit Cards Quick Tip Windows 8 FENG Smartwatch IBM Password Management Reputation Password Manager IT service Streaming Media Ergonomics Tech Support Multi-Factor Security Development Flash Content OLED Smart Technology Search Engine Techology Twitter Laptop PCI DSS Tablet Virtual Machine 2FA Fiber Optics Software Tips Employee Supercomputer NIST Customers Business Mangement Domains Smart Tech Trending Messaging Sync Audiobook Cabling Emails Hypervisor Addiction IaaS Touchpad Amazon Maintenance Policy Dark mode Bloatware Trend Micro Recycling Two Factor Authentication Practices SMS Politics Default App Netflix Wiring Advertising Saving Time Root Cause Analysis Cache Amazon Web Services Procedure Tablets dark theme Entrepreneur Shopping HBO Google Search Knowledge Safe Mode Music Criminal Notifications Hosted Computing AI Skype Consultant IT Infrastructure GDPR Data loss Analytics Bing Wireless Internet Online Shopping Shortcut FinTech Cost Management Social Network Outlook Leadership File Sharing Relocation Troubleshooting Inventory Specifications Social Networking Start Menu Best Available Investment Camera WIndows 7 Employee/Employer Relationships Screen Mirroring Video Games Loyalty Wire Evernote Employees Windows 365 Travel Frequently Asked Questions Worker Commute ISP Books Running Cable Millennials Video Conferencing Mobile Experience ROI Windows 10s Printers Bitcoin Cast Scalability Shortcuts Smart Office Wireless Charging Sales Memory

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code