On March 18, beautiful group and hungry these two commonly used outside sell software to be exposed to the sun eavesdrop user speaks daily.
In " IT times " the reporter is as long as below the exam of 3 months, they discover: No matter be An Zhuo or malic mobile phone, no matter be beautiful group,still be hungry, want you to mention some provision unconsciously in the dialog only, these are the most commonly used outside sell software total can instant land will corresponding businessman turns the home page that sends you, appear relevant commendatory probability is as high as 60%-70% . So, whether somebody darkling eavesdrop our dialog?
To your home page, appear relevant commendatory probability is as high as 60%-70% . So, whether somebody darkling eavesdrop our dialog?
User by eavesdrop?To this, hungry respond to immediately with beautiful group: Nonexistent " eavesdrop " !
Beautiful round respect says, about " the speech keyword that collects according to microphone is done for the user that sells outside the dot recommend " behavior is nonexistent. hungry the respect expresses, alleged " listening user speaks daily and do information to analyse " it is a kind of for no reason guesses.
Although two companies are denied immediately, but of the technology besides eavesdrop and Liu Qian magic, do not have the 3rd kind of method to be able to let the food that just is mentioned it seems that, appear in software immediately the most remarkable recommend the position.
Be in " IT times " in conversational experiment of the reporter, they are in 1 hour before chatting, affirmed home page is recommended in originally 3 shop, put out screen, let App backstage move. Be in this to be initiated by the user subsequently " fishing executes the law " in, " IT times " the reporter mentioned the much sort such as dining-room of Japanese arrange, harbor type arrange, tea to look continuously, and hungry recommend " accuracy " achieved of 80% .
In this test, although the reporter shut a mobile phone to be opposite ahead of schedule hungry the microphone accredit with beautiful group, but the day cat in same system, small letter is in however open condition. The following day, the reporter abolishs the microphone jurisdiction of day cat, small letter, after checking again, relevant case did not appear.
But this test result, can not regard App eavesdrop as the evidence of the user.
What privacy still is breaking down?Photograph comparing is peeked in one's childhood the anguish that diary place brings, be peeped by big data illicit brought harm wants more direct.
The description in Utopian work turns over before this hard to avoid lets a person remember a few years a variety of. In those books, or is hanging the electric screen that can be watched to be able to be monitored again by inspect already together on the wall of every family, or each person from become oosperm to begin be buried, each minutes of life are being superintended by excellent biology technology. Can in in that way environment the person still have privacy? Feel embarrassed, nonexistent.
Be apart from Hexuli to be in now " beautiful new world " in the not having of depict privacy society still has 500 years of time, but discover when you, the mobile phone number that oneself attend to be made with already real name in each website is registered login, all webpages that you had browsed, has said word, be being worn by observation, record, you can understand probably, be apart from now " beautiful new world " the world in, what need 5 centuries far from actually is long.
If you are IPhone user, then you open the map App that the system takes oneself, you can see " live " option. Although you never may have told an apple your specific address, but you can be found through fixed position like your IPhone everyday the place of pass the night, it is this mark address.
Think again, still leaving the fingerprint that has you on your IPhone is facial information even...
Nevertheless, the apple knows an user people what worrying about. At the beginning of this year January, the apple is in CES (consumptive electron exhibition) hold the ground to pull Siweijiasi hang out so a billboard -- " What Happens On Your IPhone, stays On Your IPhone " (happen on IPhone, withhold only go up in IPhone) . Made ad besides the security that gives oneself, apple also secretly satirize include Google, SamSung and Yamaxun inside, perhaps once was immersed in privacy issue eddy now " friendly business " people.
After-thought arrives this moment 2018, baidu author plum Yan Hong is mentioned in speaking, "I think the Chinese is OK more open, do not have to privacy issue so sensitive, if they are willing to be exchanged with privacy convenient quality, they are willing below a lot of circumstances, then we can do a few businesses with data. " if this is the CEO of a poineering company,say, the condemnation that the influence of incident may be confined to individual of tall to this canal and assail -- but this word comes from an employee at Baidu of company of Chinese top class technology.
Although plum this paragraph of word of Yan Hong has around language place, compensatory also say palpability wants to know what ought not to do, but the CEO of tycoon of a technology puts forward to change advantage with privacy, this topic is honest too catch eyeball. Who can still resemble analysing Lu Xun " he is dead really about " it is after all decide or inaccuracy goes euqally surely those ornaments are in get to the bottom of in the sentence " can " " if " " although " be to want to express what intention after all.
Besides too " understanding " consume software, from time to time " mutiny " search engine, you note existence move even the input method with not tall, not low however risk factor. 2015, safe company McAfee says, input method of dog of search of its researcher discovery is collected and upload user facilities information, and the individual information that uses HTTP of proclaimed in writing to transmit an user and industry data, this causes information very easily by hacker intercept.
November 2013, search dog browser ever also was exposed to the sun to go out divulge user privacy be related, take lawsuit accordingly, the compensate that be sentenced pays 300 thousand yuan. At that time, the media such as CCTV ever flaw of existence of browser of exposure search dog, bring about the privacy information such as code of name of partial user Zhang to divulge, CCTV reporter personally test and verify the whole process of flaw of search dog browser. It is reported, this one safe accident is involved accumulation fund, of all kinds email, lottery, naughty treasure, apple carries Cheng, everybody, 12306 train tickets to revise system of the management on net of ticket website, a few government sectors, and website of a few colleges.
McAfee collects the behavior of user information to express to indissoluble to search dog input method at that time, because the input method regards a function as sexual application, do not need collect information of this kind of user. And 2016, a netizen that knows a technique discovers, all content that two the famousest input methods can key in the user, with proclaimed in writing (do not add close) means uploads a server. This means a hacker to be able to know this user has inputted what content, want to do what business.
So, do not ignore an any software. Even if be existence feeling,not tall software also may be the one big source that reveals user privacy.
How to avoid privacy to divulge?1, avoid Zhang date to share:
Offer between the person that shares Zhang date to be able to give a relation to be close to normally convenient, but also have side effect. The musical software that shares Zhang date to let you gently does the music that is not clear about you to savour, the channel that carries others again divulges you to protect old information.
2, sweep user agreement:
Paid sheet of treasure year Zhang to ever caused controversy 2018. Pay treasure to ever used small character body and the joker means that are close to setting color, let all wanting that open the user of sheet of him year Zhang, ant credence is enabled below unwitting circumstance. There still is in the center, the credit grade that agrees to pay treasure general you namely gives tripartite, and agree with the third root recommend a product to the user according to this grading. This also is user picture " reasonable pour out of " a method.
3, the society is used browse without mark
For instance Chrome, Safari has mainstream browser to browse a function without mark. In this kind the mode that browse falls, what the browser uses is a kind of means that after reading, burns namely. It won't use network key actively to string together, also won't remind an user to save entry password, the network that is a kind of relative safety browses means.
4, put out fixed position function
Bought novice machine to perhaps download a new software, your mobile phone always can quiz you " otherwise should open fixed position to serve " , was about to think carefully at that time. If your accredit mobile phone gets your seat, that means you there have similar life contrail everyday, the site of meeting domiciliary, ground going to work you discloses that firm that gathers information entirely. More a few directer perhaps, any masters a person with high aspirations and determination of data, can find you at any time and place. A the realest case, when you always think you deliver small gain, fixed position of those ambiguous scene areas, village can tell others where you are probably only. But you can discover the fixed position detailed information that the dot receives him, all people that see this small gain can know where you are after all, it is a few unit of a few buildings even.