In the era of big data, as long as we use personal information to log in to mobile apps, register website accounts, etc., if personal information is used by people with ulterior motives, it can be said that we have no secrets on the Internet. In the era of mobile Internet, mobile apps will ask us for user permissions when they are operating. Some software will not work if the user does not give permissions, and some bad apps will crash directly without giving permissions. So why do apps need permissions? What permissions cannot be given casually? Let's take a look today. Why does the App need to obtain user permissions? For many apps running on mobile phones, some user permissions can ensure the normal use of the app. For example, in social software such as WeChat and QQ, the "view contacts" function requires the user to authorize the "read contacts" permission. Only after this permission is enabled can you view who in the mobile phone address book is using the same app. Similarly, map navigation software needs to obtain the "user location" permission to provide us with correct navigation.
There are also some permissions that can make mobile apps more convenient and easy to use. For example, you need to enter a verification code to log in to the app. If the app wants to implement the "automatically fill in the verification code" function, it needs to authorize the app to enable the "read text messages" user permission. It can be said that this type of permission does not require users to manually fill in the verification code, which improves the convenience of the software to a certain extent. However, if you enable the "read text messages" permission for unknown software, it is actually not a good habit.
Now most regular software will not randomly ask users to authorize mobile phone permissions. Let’s take the "Hello Bike" App as an example. If you want to run "Hello Bike" normally, you need to apply for three permissions: storage permission, user location permission, and read device information. If you want to turn on shared bicycles in the software, you also need to turn on the "camera" and "turn on Bluetooth" permissions, and these are some of the functions we must use when using shared bicycles. So, which user permissions should we be cautious about authorizing? Which user rights authorization should be paid attention to? 1. Be cautious when authorizing the "read SMS" and "notification SMS" permissions in SMS permissions . Authorizing SMS read permissions can facilitate the process of filling in the verification code, but after this permission is opened to unknown software, you will receive SMS verification codes inexplicably. In particular, if this permission is used by people with ulterior motives, information such as bank balances and capital flows will also be known to outsiders, so you should be wary of SMS permissions. 2. Be cautious when authorizing "Modify Contacts" and "Read Contacts" in the contact permissions . The reason why the App needs contact permissions is that it needs to mine friend information, find friends on the same platform, fit user habits and make it more convenient for users to use. But now there are some chaos: software without social and communication functions requires authorization to obtain contact permissions, then it is very likely that there are ulterior motives. User information is relatively valuable at present, and it is not uncommon to sell user information on the black market. It is a very rare thing for users to obtain user information through junk software and resell it. 3. Be cautious when authorizing the camera . Many apps have implemented the "Scan" function, which allows users to scan QR codes, identify objects, upload photos, etc. through camera shooting. However, authorizing camera permissions also means that the phone album will be scanned, which may cause user data leakage, analysis of pictures to accurately push advertisements, etc. In addition to the above three sensitive permissions, users also need to carefully authorize location permissions and phone call permissions. For example, if a calculator app needs to use location permissions, there will be a big problem. In addition, apps downloaded from mobile app stores can largely prevent illegal apps from infringing on user personal information. Downloading apps from regular app stores and carefully authorizing user permissions can effectively protect personal information security. |
<<: HTC, the end of China's smartphone market
On November 6, DeepBlue Automotive's intellig...
Many people would emphasize that today in the era...
2019 marks the 11th anniversary of the App Store ...
Product " user growth " is the most tro...
What happened to the Wuhan University internet-fa...
Tik Tok has been around for four years now, and t...
Before we knew it, WeChat official accounts have ...
This topic has been popular on the Internet for a...
The price increase of iPhone is not surprising, b...
At the recently held Cocos 2014 Developer Confere...
[[402336]] WeChat officially announced today that...
How much does it cost to apply for a corporate 40...
When I first learned about the event, I actually ...