Be careful! Your phone is leaving you naked

Be careful! Your phone is leaving you naked

Have you ever had this annoyance: when you search for a product on a shopping app, you will soon see recommendations for similar products when you open a browser or video app. When you talk about certain products with others, sales calls will soon come to your door. Have you and your mobile phone become so compatible? Of course not. The real answer is that your information is being leaked.

[[428367]]

In fact, mobile phone privacy leakage is already a commonplace issue, but being a commonplace issue does not mean that the problem has been solved. On the contrary, the problem of privacy leakage is getting worse and worse, and the methods are varied and difficult to guard against. From Luo Zhixiang's explosion on the spot because his girlfriend found out the contents of his mobile phone to the 315 Gala, the problem of mobile phone privacy leakage has always been on the way.

For those of us who are used to using smartphones, mobile phones are not only a tool for entertainment and payment, but also a record of our lives. This small black box records almost every one of us with very sensitive data and information: chat records with relatives and friends, travel photos and videos, daily itinerary, social accounts... The leakage of each piece of information can cause us serious losses. In such an era of big data, data has become an important asset.

So where does information leakage manifest itself?

The first is the precise delivery of advertisements mentioned above. The mobile phone system will deliver the advertisements that can best stimulate your consumption desire at the right time based on our consumption habits, consumption level, hobbies, and even consumption time. This delivery model based on big data focuses on recording the traces we have browsed online, the content we pay attention to, the apps we use, and other information, just like a witness describes a fleeing suspect to the police, and the police draw a portrait of the suspect based on the description. The purpose of information snooping is achieved without our knowledge.

The second is the APP that makes "100,000 requests" every time you open it. When user privacy is added to the corresponding rights management system (such as camera, device ID, phone permissions, etc.), some APPs rely on the "unreasonable" attitude of "you need me, you must listen to me" to obtain user permissions. The most hateful thing is that a beauty APP wants to access my photo album, which can be said to be its job, but it also wants to access the microphone, access the address, and access the movement! Do you want to come to my house and do a personal interview with me?

What’s even more infuriating is that when you reject these excessive permission requests, the “unreasonable” APP directly starts a sad drama: You actually only want me as a body, not my heart, so in that case, let’s not meet again! I’ll just say goodbye to you and leave you in the wind. If you compromise with these APPs because you need to, then our information will be monitored by them with justification.

So no one cares about such rogue things?

Of course someone is in charge. Although we are small when facing powerful systems and apps, the country has gradually discovered the loopholes here. The "Network Transaction Management Measures", "Express Delivery Market Management Measures", "Electronic Commerce Law of the People's Republic of China (Draft)" and so on all have laws and regulations on the protection of personal information. In 2020, the Standing Committee of the National People's Congress will initially review 29 legislative bills including the Data Security Law and the Personal Information Protection Law.

The passage of these bills will certainly protect our personal privacy, purify the chaos of mobile phone privacy leakage, and give people a relaxed and safe network environment. However, we still have to start from ourselves and try our best to ensure the safety of the Internet environment. The following editor has listed some tips to avoid information leakage. Come and collect them!

1. Mobile phone encryption

Nowadays, everyone uses smart phones. We can set passwords on our phones. In this way, even if strangers accidentally get our phones, they will not be able to unlock them so quickly.

2. Use the official APP for shopping

Try not to shop directly through a browser or unofficial apps, as this can easily leave traces of our login when shopping, making it easy for criminals to exploit loopholes.

3. Don’t click on unknown links easily

Nowadays, many junk software have links to red envelopes. Once you open the link for the sake of saving a small fortune, it will pose a threat to the security of personal information in your mobile phone.

4. Don’t connect to unfamiliar Wi-Fi

Especially when you are outside, do not connect to WiFi that does not require a password, and do not use unknown or dangerous networks to log in to your bank account, make purchases, or transfer money.

5. Don’t store personal information on your phone

Do not store personal ID cards, bank cards, private photos and other information in your mobile phone. Once the phone is illegally attacked, the content stored in it can easily fall into the hands of criminals.

6. Don’t visit “bad websites”

"Bad websites" that seem free actually contain many viruses. If you browse them for a long time or download some apps from such websites, your mobile phone may be hacked. Not only will the personal information in your mobile phone be leaked, but even your money may be at risk.

7. When mobile apps request permissions, you should identify

Under normal circumstances, each APP may request some relative application permissions. For example, map software will definitely request location permissions. In this case, it can be authorized, but if the map software requests permissions such as address book, camera and photos, then you must consider it carefully. If you give it casually, it may cause these software to secretly steal your personal information. It is because of this that personal privacy leaks are serious.

8. Go to regular channels to repair your phone

Buy mobile phones through regular channels and choose regular mobile phone after-sales repair shops for repair to prevent criminals from installing malware through the circulation process. If you find abnormal mobile phone traffic or suspicious applications uploading private data, you should seek help from regular after-sales service providers in time.

<<:  WeChat and Alipay announce major changes

>>:  Don’t panic if you lose your phone. Do these four things as soon as possible to avoid financial loss. Learn them now.

Recommend

On Thanksgiving, Durex teased 13 brands at once

Thanksgiving 2017, Dudu has many words of gratitu...

Should you wear socks when sleeping? You may not think of these benefits

As the weather gets colder, the question of "...

Rare! Very beautiful! 丨Base construction

Review expert: Gu Mingdi Lian (He Lin), a well-kn...

The latest gameplay guide for Tik Tok vlog bloggers!

Travel is becoming an indispensable part of peopl...

SEM data analysis method, summary of SEM data analysis!

For those who are new to SEM bidding, how can the...

A mosquito bite left a bump on me. Will I get dengue or AIDS?

It is well known that the flying height and dista...

Why are domestic mobile phones so popular, but still cannot outsell Apple?

Domestic mobile phones are becoming more and more...