Is there really no secret to guarantee under the condition of network informationization?

wrong

Many people may encounter this situation in their lives. Just after finishing a business in the bank, I received a call from other wealth management companies. Or just after searching for a content, all the recommendations are related information; Or just make a phone call, even the usual chat content will be leaked out. Information "streaking", there are no secrets in the Internet age?

Baixiaoji wisdom business

One-stop service platform for intelligent business and internet entrepreneurship

Many people may encounter this situation in their lives. Just after finishing a business in the bank, I received a call from other wealth management companies. Or just after searching for a content, all the recommendations are related information; Or just make a phone call, even the usual chat content will be leaked out.

In the Internet age, we have no secrets. All kinds of information are flooding our lives, making it easy to obtain information, but at the same time, information leakage has become a hidden danger.

There are many culprits of information leakage, among which smart phones are the most important and common.

It may not be accurate to throw the pot to the wise here. In fact, more are all kinds of apps in mobile phones, which can collect, record and transmit all kinds of data.

It is not surprising that App steals user information. "A certain software accesses mobile phone photos and files nearly 25,000 times in ten minutes"; "1 hour, an application started nearly 7000 times and kept reading the address book". These shocking figures have repeatedly reminded people to pay attention to protecting privacy.

However, some people think that everyone is swimming naked in the ocean of data anyway, and there is no privacy and nothing to be afraid of. This idea is exactly what those who sell information want. Nowadays, privacy trafficking has formed an industrial chain. If you don't raise awareness of protection, the consequences will be unimaginable. Information "streaking", there are no secrets in the Internet age?

Baixiaoji wisdom business

One-stop service platform for intelligent business and internet entrepreneurship

Many people may encounter this situation in their lives. Just after finishing a business in the bank, I received a call from other wealth management companies. Or just after searching for a content, all the recommendations are related information; Or just make a phone call, even the usual chat content will be leaked out.

In the Internet age, we have no secrets. All kinds of information are flooding our lives, making it easy to obtain information, but at the same time, information leakage has become a hidden danger.

There are many culprits of information leakage, among which smart phones are the most important and common.

It may not be accurate to throw the pot to the wise here. In fact, more are all kinds of apps in mobile phones, which can collect, record and transmit all kinds of data.

It is not surprising that App steals user information. "A certain software accesses mobile phone photos and files nearly 25,000 times in ten minutes"; "1 hour, an application started nearly 7000 times and kept reading the address book". These shocking figures have repeatedly reminded people to pay attention to protecting privacy.

However, some people think that everyone is swimming naked in the ocean of data anyway, and there is no privacy and nothing to be afraid of. This idea is exactly what those who sell information want. Nowadays, privacy trafficking has formed an industrial chain. If you don't raise awareness of protection, the consequences will be unimaginable.

So, how to take preventive measures?

First of all, many people actually have a misunderstanding: as long as they don't download the small factory App, the big factory App can be trusted. But this is not the case. Many large-scale apps, such as Pinduoduo, Meitu Xiu Xiu, the glory of the king, Sina Weibo, etc. , also frequently start and wake up similar apps, beyond their authority.

You can guarantee safety without permission? This is also a protective measure that many people think. But in practice, it is very difficult to do this. There are two reasons:

1. Some apps go on strike and lie down without permission, which means I won't let you get on the bus unless you give me the back door. At first glance, there is no way but to give it all the permissions you need.

Even if you don't give him permission, it doesn't matter. It has other channels to obtain information. Because you will always open some permissions to other apps. Finally, get your information through multi-party data streams.

Therefore, this not only requires relevant departments to strengthen the supervision of App, but also requires everyone to strengthen their awareness in this regard.

First of all, when downloading an App, it is best to choose an Appstore with low malicious density, such as Apple's App Store and Android's App Store. Secondly, when installing the App, various permission applications will pop up. At this time, we must pay attention to 26 privacy rights such as location information and mobile phone address book, and don't give them if they are not commonly used.

In addition, it is necessary to regularly clean up the memory data of the mobile phone, do not leave key information such as ID card photos and bank card numbers in the mobile phone, and regularly check the application rights of the mobile phone.

Finally, when information is leaked, we must use legal weapons to safeguard our legitimate rights and interests.