After the exposure of 50 apps by CCTV, the chairman of 360 officially said, where is the user’s privacy security?

Smart phones have become a must-have for people. They are not only simple electronic devices, but also an indispensable part of our lives. People will install a variety of applications on their mobile phones to meet their needs. However, there are many problems in these apps, which may leak user information inadvertently. < / P > < p > at the 315 party later this year, CCTV exposed 50 apps. A total of 50 apps had built-in SDK plug-ins to steal users’ privacy. Some reading software also need to get the location of the user’s mobile phone, mobile phone number. Applications require a lot of authorization, which is to steal users’ privacy and maliciously deduct fees. < / P > < p > if it is not authorized, it will not be used. Among the 50 apps exposed, more than 10 may be implanted with viruses, causing damage to the hardware of mobile phones. However, after the exposure of 50 apps by CCTV, Zhou Hongyi, chairman of 360, made an official speech. During a conversation in a program, Zhou Hongyi said that some software would secretly open the camera and microphone, steal user information, intercept keywords in the conversation recording to match interest and love content. As the chairman and founder of 360, Zhou Hongyi, who said that some software secretly opened the camera must be authoritative. 360 security team is famous not only in China but also in the world. In Zhou Hongyi’s formal voice, the situation of software stealing users’ privacy information has also been confirmed. < / P > < p > although we all know that some software will automatically read the user’s privacy, and may upload photos, accounts, passwords, etc. to the server. However, there is no way for users to prohibit the sale of information and obtain benefits. It seems that they have no second choice but to allow authorization. < / P > < p > to solve this problem, we need to work together in three aspects. One is that software developers abide by industry rules and prohibit users from stealing their privacy at will, which may require the supervision of relevant departments. < / P > < p > the second aspect is the launch platform. Most users download software in the app store that comes with their mobile phone. Therefore, the app store should strengthen the audit management and prohibit the software with malicious privacy stealing from the shelves. < / P > < p > the last aspect is the user himself. When facing the unknown software and the software downloaded from the third-party app store, do not authorize it easily. Know the service of the software. If it’s a map software, it’s understandable to get the location authorization, but there’s a problem in getting the photo album permission and so on. In the network era, information security has become a problem that bothers many people. Maybe a self portrait and a positioning will be used by people. Including going out to live in a hotel, there may be some problems with personal privacy and security. < / P > < p > we should not only strengthen the management of personal information, but also not disclose personal information on the Internet at will. Also hope that the major application developers can have a code of ethics, otherwise the victims are ultimately themselves. Continue ReadingXiaomi new machine real machine exposure center dig hole screen design or high color thousand yuan machine

Author: zmhuaxia