The Ministry of Industry and Information Technology has taken action to ban these behaviors in mobile apps. The end of rogue software is coming.

The Ministry of Industry and Information Technology has taken action to ban these behaviors in mobile apps. The end of rogue software is coming.

Why does a game app need to obtain our location information? Why does a shopping app need to read our address book and call logs? There are many apps that obtain mobile phone permissions beyond the scope of the scope, and some even refuse to allow users to use the app without permission. Faced with the chaos of these apps obtaining permissions at will, the Ministry of Industry and Information Technology has finally taken action to regulate and rectify the situation. The end of rogue software is finally coming.

[[396280]]

At present, there are two major domestic smartphone systems: Android and Apple IOS, among which Android has the largest number of users. Compared with Apple IOS system, the biggest feature of Android phones is the rich and numerous application software categories. Therefore, the scalability and usability of Android phones are very strong. However, this high playability also brings some troubles to Android phone users. In addition to some malicious rogue software pop-up ads, the biggest trouble is that various application software obtains mobile phone permissions beyond the scope, and even forcibly exits without giving permissions.

[[396281]]

Why does a game app need to access our contacts and call logs? Why does a shopping app not only need to obtain our location information but also use our mobile phone camera? Although the reasons given by major application service providers are to provide better services to users, the fact is that they want to collect more user information for more targeted promotional marketing activities, or even the criticized big data killing of familiar customers. Of course, it is not ruled out that some niche apps collect personal information and then sell it. However, faced with the unreasonable demands of these apps, users seem powerless.

Therefore, the situation of obtaining mobile phone permissions and personal information beyond the scope of the mobile application ecosystem must be rectified.

Recently, the Ministry of Industry and Information Technology, together with several other departments, drafted the "Interim Provisions on the Protection and Management of Personal Information of Mobile Internet Applications (Draft for Comments)" to regulate the chaos in the APP ecosystem.

Although this is just a draft opinion, there are still three points that deserve our attention and expectation.

1. When obtaining mobile phone permissions, the application software shall not adopt a non-default check method;

2. Application software shall not apply for other permissions beyond its business scope, nor shall it use pop-up windows to frequently apply for permissions that are not related to its business;

3. After the user refuses the APP's application permissions, the program cannot be forced to exit;

The above three points are some management regulations proposed to address the main problems existing in the current mobile application ecosystem. They are of great significance for more effective regulation and management of mobile application APPs in terms of obtaining permissions and personal privacy.

In fact, Xiaomi has also made a lot of efforts on how to protect users' personal privacy and limit rogue software from obtaining permissions beyond the scope. Among them, the security protection measures such as flares, privacy masks and interception nets launched by MIUI 12 have resolutely said no to these rogue software, and have become a leader in the entire mobile phone industry. In the latest MIUI12.5, Xiaomi has also added a location information blurring function, making it impossible for APP to obtain the user's precise location. In addition, the latest Apple iOS system has also made corresponding adjustments to the issue of APP obtaining user privacy.

Summarize

The chaos in the mobile phone system ecosystem regarding personal privacy and malicious acquisition of mobile phone permissions has reached a point where it must be rectified. The draft opinion of the Ministry of Industry and Information Technology also clearly stipulates these chaos. Of course, in addition to these rules and regulations, it is more important to rely on the self-discipline of major mobile phone application developers, the supervision of the mobile phone application market, and the strict control of application permissions by the mobile phone system. From the institutional and technical levels, rogue software will have nowhere to hide.

What annoying things have you encountered while using your mobile phone?

<<:  iOS 14.5 official version is here: 13 new features updated, 12 bugs fixed

>>:  Should you turn on iOS privacy tracking? You will understand after reading this

Recommend

AI autonomous weapons are here, our generation’s Oppenheimer moment is here

In the conflict between Russia and Ukraine, a vid...

WeChat 8.0 era begins! Teach you how to make dynamic emojis

Recently, WeChat has updated to version 8.0. In t...

How does the navigation app know that the red light is about to turn green?

With the continuous advancement of science and te...

From artificial intelligence to Landau School, what have we lost in these years?

From artificial intelligence to Landau School, wh...

C4D+Octane+PS [E-commerce product required course teaching collection]

C4D+Octane+PS [E-commerce Product Compulsory Cours...

Tips for Spring Cleaning: Cleanliness ≠ Health

The cups are toasted to welcome the new year, and...

Meitu Xiuxiu Competitive Product Analysis Report

Beauty photography has become an important tool i...

Do webpage titles and article titles mean the same thing?

Student asked: Do the webpage title and article t...