WeChat actually wants to have its own input method? Is it really necessary for WeChat to have a keyboard?

WeChat actually wants to have its own input method? Is it really necessary for WeChat to have a keyboard?

Recently, some netizens broke the news that WeChat has added its own input method in the latest beta version. As long as you go to WeChat settings, you can find a plug-in called "WeChat Keyboard". After turning it on, WeChat's own input method will be used to input questions when chatting on WeChat. Regarding this improvement, many friends are confused. Is it that the built-in input method is not effective or the third-party input method is not popular? For a chat app, does it need to reinvent the wheel? Why did WeChat develop its own input method? Let's talk about it briefly.

WeChat internal beta adds built-in keyboard

Why does WeChat want to develop its own input method?

According to WeChat itself, WeChat had no choice but to include a keyboard. According to media reports, Zhang Xiaolong said that WeChat originally did not want to develop an input method, but received many complaints from users that their chat records were stolen because they would see corresponding ads for whatever they typed. Zhang Xiaolong explained that WeChat does not save chat records, and WeChat also stipulates that anyone who reads a user's chat records will be fired.

Is this explanation reliable? I think it makes sense. As a channel for users to input information, input methods naturally have the ability to spy on user information. Many friends have reported in recent years that e-commerce platforms inexplicably push what they want, and even suspected that there are apps recording and eavesdropping in the background, but this is actually very likely related to the leakage of personal information by input methods.

Do input methods really steal privacy?

In fact, it is common knowledge that input methods can leak personal information. Modern input methods generally have networking functions to achieve word library synchronization and even cloud word library. From a mechanism point of view, this kind of function will upload the words and sentences you input to the cloud. If the input method service provider wants to spy on users, it is fully capable of doing so.


Cloud dictionary and other functions have become standard features of third-party input methods

In this regard, platforms that focus on privacy have regulated input methods to a certain extent. For example, Apple iOS has not allowed the existence of third-party input methods for a long time. Even if the entrance to third-party input methods is now opened, access to password boxes, network permissions, and context snooping are not allowed by default. Although Android is weaker in this regard, the native Android system will also give a prompt that personal data may be collected when a third-party input method is enabled.


Android will prompt the risks of using third-party input methods

In addition, some apps that attach great importance to security will also restrict third-party input methods. For example, some mobile banking clients will call their own keyboards when entering passwords, instead of using the current system default input method, to prevent key information such as passwords from being snooped. This time, WeChat has its own keyboard, which seems to have raised the level of security to the same level as mobile banking apps. Is this necessary? It is left to users to comment.

How to prevent input methods from stealing privacy?

Input methods do have the ability to spy on privacy, so how should we prevent it? Here are some experiences.

·Use the system's built-in input method . Compared with third-party input methods, system-built-in input methods are often less likely to collude with promotion platforms. For example, the input method that comes with iOS does not even have networking functions such as cloud input. However, it should also be noted that some system-built-in input methods are deeply customized solutions from third parties, and there is also the possibility of leaking personal information.

·Disable key permissions for third-party input methods . If you think a third-party input method is indispensable, you can use this method. For example, in iOS, do not open the full access permission of the input method. In Android, you can prohibit the input method from connecting to the Internet or obtaining your identity (usually by obtaining phone permissions).


Be careful to open full access permissions for input methods

Use a more reliable input method . For example, you can use an input method without an Internet connection, or disable the cloud dictionary or cloud synchronization function of the input method. Another idea is to use an input method that does not operate in China, such as Google's Gboard.

Summarize

In general, the mechanism of the input method itself determines that it can spy on user information. After adding the networking function, it will give rise to the risk of leaking personal privacy. The comprehensive user experience of third-party input methods is still higher than that of built-in input methods, and cloud-related functions can indeed greatly improve the user experience. How to balance convenience and security? I am afraid it is a question worth thinking deeply.

<<:  Android 12 detail adjustments: notification system count is more prominent

>>:  iOS 14.5 RC version update: Added unlocking with mask, supports the latest AirTag

Recommend

Magnesite: This is a stone that can be used to weave cloth?

Brucite is named in honor of Archibald Bruce (177...

11 great websites for learning iOS development

[[138057]] Never stop learning from others I beli...

What types of ads should you pay attention to when promoting Baidu Union?

Baidu Union Promotion is one of the core products...

JD Power: 2022 China New Car Purchase Intention Study

Research shows that the brand influence of indepe...

The "modern Darwin" who spent his life studying ant society has passed away

This is what Calendar Girl wants to say Biologist...

You can earn 100+ a day by executing it, a brainless project on Xianyu

Today I want to share with you an Xianyu project ...