What do you talk about and what do you push? Who is "monitoring" your phone?

What do you talk about and what do you push? Who is "monitoring" your phone?

I mentioned two brands casually.

When you look down and refresh, the mobile ads will match

Meet up with friends and talk about hotpot

The next second, the app is full of recommendations for nearby hot pot restaurants

Even if you want to change a pair of slippers, the APP can accurately locate you

It seems like a prophet who will push it to you in time

Have you had this experience?

It seems like every move is under surveillance?

Today, I will reveal the secrets to you.

How Cell Phones Eavesdrop on Us

01

Call the phone microphone permission

Nowadays, when we download and use mobile phone apps, we often habitually grant them mobile phone permissions as required, sometimes including the mobile phone microphone. This gives some apps an opportunity to take advantage of us, and when we use these apps, there is a risk of being "eavesdropped" through the microphone.

With permission to use the microphone, mobile phone apps may be able to hear our conversations and even the sounds around the phone without our knowledge.

When the APP is running stably in the foreground, it can even pick up the sound steadily, achieving perfect "eavesdropping" (Switching the APP to the background does not mean that recording is not possible, but after a period of time, the system will often restrict the background APP from recording).

When the conditions for "listening" are met, some APPs will secretly upload the collected information while connected to the Internet, analyze the content, and then accurately deliver advertisements to us.

02

Big Data Analysis

In our daily life, when we use our mobile phones, we inevitably leave some traces, such as geographic location, browser search history, purchase history, and other information. Big data will collect and organize this information, and then use algorithms to analyze the image to determine our potential needs, and then select matching advertisements. When the push notifications are relatively accurate, we will wonder if we are being "eavesdropped" by the phone; on the contrary, when the push notifications are inaccurate, we will naturally not have such associations.

It can be seen from this that

Cell phones can indeed eavesdrop on us

Get our personal information

So how do we protect our information security?

The editor has some tips for you!

1. Grant the APP mobile phone usage permissions based on the nature of the APP. Do not over-authorize the APP, especially the camera, microphone, call, album and other permissions should be handled with caution.

2. Try not to click on URL links from unknown sources, and don’t download apps from unknown sources on the web. It is recommended to download them from the official app store.

3. Do not scan QR codes with unknown content at will, and try not to fill out questionnaires online at will.

4. Set different passwords for different APPs, especially financial APPs, which require more attention to account and password protection.

5. It is recommended to install mobile phone security protection software and conduct security checks on your mobile phone regularly.

Source: China Telecom, Xinhua News Agency

The pictures in this article with the "Science Popularization China" watermark are all from the copyright gallery. The pictures are not authorized for reprinting.

<<:  The "North-South Dispute" is here again! Why is the Little New Year's Eve in the South and the North one day different? The answer starts here...

>>:  She was considered to win the Nobel Prize and said "I do" three times for her country

Recommend

6 sets of “Mid-Autumn Festival” marketing planning schemes!

Restaurant Mid-Autumn Festival Planning Scheme (I...

How to grow vegetables in space?

Seeing the "Shenzhou 13" spacecraft car...

Android official IDE has been upgraded to fully support C/C++

Google has revealed the next version of Android S...

Helmets are far from enough. Virtual reality is about comprehensive strength.

In 2015, with the bombardment of information from...

What should I do if the Douyin showcase score is low?

There is no doubt that Douyin is a very popular s...

Which one is better, Alipay Mini Program or WeChat Mini Program?

It is understood that the Alipay mini program wil...

The essence of user operation & two-step method

For a long time, many marketers and operators hav...

Why do you keep getting acne? Which of these 20 reasons do you fall into?

A netizen asked: Teacher, please tell me how to a...

How to write the New Year copy for 2018?

It’s the end of the year, and everyone is startin...

Amazon Athena is now available in AWS China (Ningxia) Region

The new pay-as-you-go interactive query service c...

HTC 8X Telecom Edition, don't upgrade to WP8.1

The WP8.1 preview version was released tonight, an...

Domestic smart home market cools down: lack of models leads to capital waiting

In 2014, the concept of smart home seems to be be...

Where is Xixia?

This is a A mysterious, long-neglected dynasty It...