The Ministry of Industry and Information Technology has taken action to ban these behaviors in mobile apps. The end of rogue software is coming.

The Ministry of Industry and Information Technology has taken action to ban these behaviors in mobile apps. The end of rogue software is coming.

Why does a game app need to obtain our location information? Why does a shopping app need to read our address book and call logs? There are many apps that obtain mobile phone permissions beyond the scope of the scope, and some even refuse to allow users to use the app without permission. Faced with the chaos of these apps obtaining permissions at will, the Ministry of Industry and Information Technology has finally taken action to regulate and rectify the situation. The end of rogue software is finally coming.

[[396280]]

At present, there are two major domestic smartphone systems: Android and Apple IOS, among which Android has the largest number of users. Compared with Apple IOS system, the biggest feature of Android phones is the rich and numerous application software categories. Therefore, the scalability and usability of Android phones are very strong. However, this high playability also brings some troubles to Android phone users. In addition to some malicious rogue software pop-up ads, the biggest trouble is that various application software obtains mobile phone permissions beyond the scope, and even forcibly exits without giving permissions.

[[396281]]

Why does a game app need to access our contacts and call logs? Why does a shopping app not only need to obtain our location information but also use our mobile phone camera? Although the reasons given by major application service providers are to provide better services to users, the fact is that they want to collect more user information for more targeted promotional marketing activities, or even the criticized big data killing of familiar customers. Of course, it is not ruled out that some niche apps collect personal information and then sell it. However, faced with the unreasonable demands of these apps, users seem powerless.

Therefore, the situation of obtaining mobile phone permissions and personal information beyond the scope of the mobile application ecosystem must be rectified.

Recently, the Ministry of Industry and Information Technology, together with several other departments, drafted the "Interim Provisions on the Protection and Management of Personal Information of Mobile Internet Applications (Draft for Comments)" to regulate the chaos in the APP ecosystem.

Although this is just a draft opinion, there are still three points that deserve our attention and expectation.

1. When obtaining mobile phone permissions, the application software shall not adopt a non-default check method;

2. Application software shall not apply for other permissions beyond its business scope, nor shall it use pop-up windows to frequently apply for permissions that are not related to its business;

3. After the user refuses the APP's application permissions, the program cannot be forced to exit;

The above three points are some management regulations proposed to address the main problems existing in the current mobile application ecosystem. They are of great significance for more effective regulation and management of mobile application APPs in terms of obtaining permissions and personal privacy.

In fact, Xiaomi has also made a lot of efforts on how to protect users' personal privacy and limit rogue software from obtaining permissions beyond the scope. Among them, the security protection measures such as flares, privacy masks and interception nets launched by MIUI 12 have resolutely said no to these rogue software, and have become a leader in the entire mobile phone industry. In the latest MIUI12.5, Xiaomi has also added a location information blurring function, making it impossible for APP to obtain the user's precise location. In addition, the latest Apple iOS system has also made corresponding adjustments to the issue of APP obtaining user privacy.

Summarize

The chaos in the mobile phone system ecosystem regarding personal privacy and malicious acquisition of mobile phone permissions has reached a point where it must be rectified. The draft opinion of the Ministry of Industry and Information Technology also clearly stipulates these chaos. Of course, in addition to these rules and regulations, it is more important to rely on the self-discipline of major mobile phone application developers, the supervision of the mobile phone application market, and the strict control of application permissions by the mobile phone system. From the institutional and technical levels, rogue software will have nowhere to hide.

What annoying things have you encountered while using your mobile phone?

<<:  iOS 14.5 official version is here: 13 new features updated, 12 bugs fixed

>>:  Should you turn on iOS privacy tracking? You will understand after reading this

Recommend

Short video app “Tik Tok”: Will it become popular for a while and then die?

I wrote an article before about how the rapidly g...

When an asteroid strikes, what else can we do except let the Earth wander?

When an asteroid strikes, what else can we do exc...

8 things you should know about Apple Watch before the launch

Apple watch Apple's Spring Forward conference...

Why do we say we are descendants of the dragon?

=========================================...

5 ways to quickly increase your Zhihu followers!

To be honest, I am quite reluctant to share this ...

Event promotion: Improve the conversion rate of offline activities?

This article will use offline activity cases to a...

Even bullets can’t break it, why is Rupert’s Tear so magical?

There is a very interesting little thing called &...

5 basic skills for brand private domain implementation!

After experiencing the epidemic in 2020, brands a...

Decrypting “User Uninstall”! 3 data points worth paying attention to!

Do you want users to use your app for a long time...

The secret to explosive growth in short video ads!

The "White Paper on the Value of Bytedance S...

Analysis of ICBC's competitive products!

With the continuous penetration of the Internet i...