WeChat responds to the central media’s comments on reading users’ photo albums: How much more “peeking” is going on that we don’t know about?

WeChat responds to the central media’s comments on reading users’ photo albums: How much more “peeking” is going on that we don’t know about?

Recently, Tencent WeChat was exposed for repeatedly reading users' photo albums in the background. Afterwards, WeChat explained the reason for this operation, denied stealing user privacy, and promised not to use this function in the future.

Regarding the issue of these apps arbitrarily using user privacy, the Workers' Daily published a commentary today titled "How many more 'peeks' are there that we don't know about?", pointing out that the "Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications" which came into effect on May 1 this year have clear definitions.

For example, the necessary personal information that instant messaging apps can collect only includes the registered user’s mobile phone number and account, and the list of instant messaging contact accounts, but the user’s photo album is not included.

However, despite the strict rules and heavy blows, there are still people who take risks and skirt the rules. This is because in the digital economy era, user data is becoming more and more valuable, and it is for their own benefit.

The users are in the open, while the "peeps" are in the dark. How many more "peeps" are there that we don't know about? We don't know. Technology updates too fast, and we can't wait until new problems are discovered before calling for a halt. It is difficult to stop APP illegal and irregular behaviors in a timely and effective manner by simply improving laws and regulations and strengthening supervision.

The Workers' Daily stated that to prevent a new round of "voyeurism", supervision and technology must be combined.

On the one hand, we should encourage APP service providers and mobile phone system developers to strengthen self-discipline and conduct regular self-inspections and self-corrections. On the other hand, we should build a comprehensive regulatory system with government management, social coordination, public participation, media supervision, and technological support.

At present, the contradiction between data value and data security is becoming more and more serious. It is foreseeable that with the improvement of relevant laws and regulations, the space for "peekers" to exploit will become smaller and smaller.

[[427989]]

<<:  Apple iOS 15.1 supports upgrades and adds four new features that you have been waiting for

>>:  The phone freezes suddenly, and the screen doesn't respond when you click it. Here's a way to force restart the phone.

Recommend

Will Neisseria meningitidis definitely cause meningitis?

Recently, the news that two junior high school st...

What SEO strategies should startups adopt?

"The search rankings cannot rise as expected...

Can ASO be performed in the Android Market? Do you know how to do it?

Many domestic channels are based on quantity, but...

In-depth analysis: The top 500 mobile apps list in May 2016!

Last Monday, we released the TOP500 mobile APP ra...

26 Great CPU Overclocking Tools in History

1The 26 greatest processor overclocking tools in ...

Color TV enterprises have to fight a tough battle in the post-entry hardware era

The impact of the expiration of energy-saving and...

8 hours to complete keyword optimization of an app

I believe some friends are not particularly famil...

How do fireflies glow? Are they charged in advance?

Produced by: Science Popularization China Author:...

To get out of the traffic winter in 2019, operators must know two models

The more severe the economic environment, the mor...

The new drug was terminated early because the effect was too obvious.

Anticoagulation is required to treat atrial fibri...

Learning Numerical Algorithms with Playground

In middle school, there was nothing more terrifyi...

Toutiao’s addictive data mining

Due to some irresistible forces, Toutiao 's p...

A brief analysis of precise audience targeting in Internet advertising!

With the development of Internet advertising tech...