WeChat now has a small program called "MiXin" for information encryption

WeChat now has a small program called "MiXin" for information encryption

Tencent has now launched an information encryption mini-program "Tencent Secret Message" on WeChat. According to the official introduction of the mini-program, with the development of the Internet, more and more sensitive data need to be transmitted on open networks. The mini-program adopts national secret algorithms to protect the transmission of sensitive data through data encryption and digital signatures.

It is reported that Tencent Secret Message users need to be responsible for the integrity and correctness of the master key. All losses and consequences caused by the incorrect use or loss of the master key due to improper maintenance by the user, which leads to the inability to decrypt the encrypted data, shall be borne by the user. After completing the registration, you can start to create Secret Message. After filling in the Secret Message content, you can add a note to describe the purpose of the Secret Message, such as passing a file password. After completion, you can manually add recipients, and only the specified recipients can view it.

The mini program also provides an option for the expiration date of the secret message. After the expiration date, the secret message cannot be viewed. After the secret message is successfully created, a secret message QR code will be generated. The creator can download the QR code and send it to the recipient by sharing it on WeChat. The recipient can open and decrypt it directly in the chat box, or use WeChat to scan the corresponding QR code to view the secret message.

However, the Tencent MiXin mini program is currently undergoing system update and maintenance, and searches do not yet display results. It is unclear when it will be online again.

<<:  How to improve the product experience in response to user operational errors?

>>:  Mobile phone sales are out, Apple is no longer the king, domestic manufacturers are at the top

Recommend

China Mobile APP Advertising Fraud Analysis Report

PC is disappearing from our daily life scenes at ...

Hair loss self-help guide: What can save you? My sparse hair...

Image source: Tuchong Creative Are you losing you...

Smart + short video, mobile marketing enters the second half

01. Traffic concentration and marketing efforts T...

Wanted to prove Einstein's theory was wrong, but won the Nobel Prize for it

It is said that the Nobel Prize Committee of the ...

iQIYI’s overseas app network optimization practices

​When it comes to overseas markets, especially wh...

Is it better to use CDN or high-defense server configuration for server defense?

Is it better to use CDN or high-defense server co...

Following the law of survival of the fittest, iPad mini may become history

This year's WWDC (Apple Worldwide Developers ...

Southerners eat lamb, but Northerners don’t understand!

Loading long image... Source: National Geographic...

What is the secret behind TikTok’s explosive user growth?

Think first: How do you measure user growth ? Wha...

APP promotion and operation is difficult, where are the pain points?

Do you often encounter the following scenarios: T...

Ximalaya's "423 Listening Festival" promotion strategy

Friends who don’t pay much attention to the knowl...

Xiaohongshu Operation Guide

Let’s take a look at how to achieve conversion ra...