Is the iPhone the safest and most reliable phone? I once believed that it is! However, a recent case has caused me to lose confidence in the iPhone. Now I have to believe that an Android phone that can be installed with various security software may have better security performance than the iPhone. This case is like this: Recently, a colleague who uses an iPhone 5s found that his data traffic was "used in large quantities" for no reason, and even hundreds of yuan were "consumed" for no reason within 30 minutes. The colleague first thought it was a problem with the operator. After calling the operator to inquire, he was told that the problem was with an email app in the colleague's iPhone. The operator said that this email app was constantly uploading attachments, causing the traffic to continue to be consumed. Later, the colleague entrusted me to contact the company that provided this email app. After inquiries the next day, it was confirmed that the email app did have a vulnerability, and the company is currently urgently repairing the vulnerability. The Internet company said that only a few users were affected. But the program of the same software is the same, and if one user is affected, it is likely that all users are affected. The case also shows that the iPhone, which has always been known for its security, is not as perfect as people imagine. As a closed system, unless the user jailbreaks, the iOS operating system of the iPhone is like a natural protective layer, which protects the iPhone from any Trojans and viruses. But as the saying goes, "It is difficult to prevent thieves at home even if you guard against them day and night." What if there are loopholes in the "legal" software approved by Apple in the Apple App Store? Since the iOS system does not have any third-party security programs to monitor it, the relevant loopholes are almost impossible to prevent, and they will not be discovered until the loopholes are large. In fact, it is easy to control the problems of traffic surges and anomalies on Android phones: most Android phones will install security software, which can easily monitor problems such as traffic anomalies. But similar problems are almost impossible to prevent in the iOS system. A technician told the author that whether it is installing security software that lacks control on iOS or using iOS's own programs, the monitoring of out-of-control traffic is very inaccurate. With the advent of the 4G era, the surge in traffic usage has become a reality, which cannot but be said to be a major challenge for iOS. Since Apple recently launched iOS8, allowing third-party input methods to enter the Apple system, is it possible for Apple to reduce its confidence a little and allow third-party security software to play its role? The author believes that this may be difficult in the short term, but Apple users need to be more careful and not be too confident about the security of their iPhones. As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
<<: AMD: By 2023, AMD CPU's share of the server market will exceed 25%
>>: Make a stylish headphone Beats new Solo2 review
Meizu MX4 Pro is here, it is the second phone lau...
With the development of the times Nowadays, the p...
With the development of e-books, more and more pe...
When the Shenzhou spacecraft goes up to the sky, ...
Faceless monster slide spacewalk teaching video +...
This article mainly introduces how to become popu...
Nature is not a very friendly place for small ani...
Frontier Course: New Energy Vehicles 2021 Hello, ...
Why do Tik Tok ? How to make Tik Tok? For enterpr...
Background knowledge: CAC = cost to acquire a sin...
What I want to share with you today is the refine...
As network technology becomes increasingly mature...
"Dad's Laboratory" has been providi...
This article will share some key points and techn...
There is a magical organ in our body. It is usual...