A fake APP is a small APP developed by developers for certain purposes. It looks very similar to the main app, but is different. Vests have been around since the birth of App. At first, vest apps were a rather niche traffic-generating tool , but since Apple cracked down on chart manipulation , vests have become standard. As someone jokingly said, if you want to top the charts, how can you not have a small account? After Inke was removed from the shelves several times in early 2016, fake apps Inke and Inke (with different developer accounts) were immediately launched, showing that they were fully prepared. According to the different function settings of the vest app, the difference between each vest and the main account is also divided into: 1. Some APPs adopt a matrix strategy. The vest icon and name are different, but the content is basically the same as the main account. 2. Some are targeted at different target users. The vests adopt some functions of the main App and have special functions and content. 3. If you don’t want everyone to know the main app, usually the app name/icon/app screenshots/opening screen pictures/keywords/developer account will be different from the main app 4. For Yingke, 'Yingke' and other aliases exist as backup accounts. When the main account is removed from the shelves for manipulating the rankings, it will be immediately put on the shelves as a substitute. Many users who are unaware of the truth do not notice it, so many developers of this type of substitute aliases directly use all the resources of the main App and simply change the developer account. If resources permit, you can also use different backends, which can also avoid emergencies such as the backend being hacked and the main app being removed from the shelves. (I didn’t mention anything about Lagou and Boss Zhipin, don’t think too much about it.) 5. This year, CCTV exposed a number of malicious fee-defrauding apps. They will also be equipped with a green version of the app to prevent inspection. Himalaya FM is also a textbook example that must be mentioned when it comes to fake apps. It belongs to the second type mentioned above. The role of vest APP We don’t know the original intention of the first person to create a vest app, but it is currently commonly used for: 1. Conduct revision tests on the main account to minimize risks. There are many disadvantages in using the main App for version testing. The advantage of the vest is that it can be changed at will, and if any adverse effects are caused, it will not cause major losses. If the test results are good, the main App can be iterated with corresponding functions. 2. Lead The vest app itself can acquire new users, and there are three main ways to direct traffic to the main account: 1. If the vest and the main App use the same backend, user information can be shared; 2. Guide users to download the main App through pop-ups, advertisements, and push notifications. 3. Some apps have connected to online alliances to redirect traffic to each other. 3. Increase keyword coverage The maximum length of App Store keywords is 100 characters. It is understood that the limit of normal human optimization is a keyword coverage of about 2,000. Those with a coverage of 6,000+ are all exploiting Apple loopholes. Therefore, creating one more alias means covering more keywords. 4. Ranking manipulation Common ways to manipulate the rankings include: 1. Points wall . Theoretically, they are real users, and the number of users who rush to the top of the list is large, and they can be reliably maintained by subsequent replenishment; however, the cost of rushing to the top of the list and maintaining the list is high, which is not affordable for ordinary products. 2. Real machine. Use real machines to operate tasks, but do not wipe the machines, otherwise it will become fake volume, and the cost is relatively low. 3. Technical flow. Machine flash, server controlled operation, lowest cost. In short, real users are expensive, and machine-brushed ones are the cheapest. If the main app relies on machine brushing to rush to the top of the list, the loss will be too great once it is discovered and removed from the shelves by Apple. Generally, the fake apps are promoted through machine brushing. Once they are ranked in the top few places, the number of downloads will naturally increase. Even if the fake apps are removed from the Apple list, it will not affect the main APP. Because the developer accounts of the vests are different, Apple cannot deal with the main App based on evidence. Of course, Apple’s forced punishment cannot be ruled out. When the fake app is downloaded to the user's mobile phone, the user can be induced to download the main app through version upgrades and other methods. Existence is reasonable. The reason why vest APPs have become popular from a niche market is the prevalence of chart manipulation and Apple's crackdown on it. We will not comment on whether to manipulate the rankings or wear a vest during app promotion. We can only say that Apple will sooner or later take certain measures to deal with such behavior that is considered to be suspected of cheating, so friends who (want to) wear a vest should be careful. Mobile application product promotion service: APP promotion service Qinggua Media advertising This article was compiled and published by @Stephen Jing ( Qinggua Media ). Please indicate the author information and source when reprinting! |
Recently, Ma Huateng , deputy to the National Peo...
Xiaohongshu App is hailed as a magic tool for you...
Why are my ads always performing poorly? I think ...
As we all know, there are two biggest obstacles t...
Do you feel like I always shoot videos that are n...
iOS 11 eliminates all non-64-bit chip devices, wh...
I believe everyone has experienced the "mone...
How much does it cost to attract investment in th...
People watch what they want to see, and sometimes...
With the development of my country's network,...
If the goal is to acquire customers, then you nee...
According to real-time data compiled by Johns Hop...
Chengdu Pincha has its own studio: 135-5021-2450 ...
The concept of "big operation" is not n...
An article explains the AARRR, HOOK model and oth...