Current location - Loan Platform Complete Network - Big data management - Look at big data
Look at big data
Book: Privacy in the Age of Big Data

Privacy in the era of big data

Looking around the world, most people expose their personal identity information to thieves, and business groups are also trying to deal with cyber spies and patent thieves; Banks are facing more and more cyber attacks; Social media networks and Internet platforms are constantly being attacked by malicious software and viruses.

Information security has long been a content that cannot be ignored.

For ordinary people, it seems far away, because the leaked information will not bring obvious economic losses and will not cause physical harm. At most, I will be snooped by the other party, which doesn't feel good.

Just like today's smart advertising, one second you enter a search engine, and the next you push an advertisement for something you might need on another website. Your every move is being analyzed, and your portrait is constantly being labeled. You know this is the technology of advertisers and big companies, but you can't refuse their free services.

When you watch TV, at least one TV program provider tries to observe you with the camera on the TV or controller. Even the power company can record and analyze the activities in your home.

Before that, the camera was the most easily monitored electronic device, but now in the era of Internet of Everything, everything may be monitored, and even there is no defense method.

Such as biometric technology.

Why would anyone want to invade your privacy? Just because the more he knows about you, the more he can influence your decision. We describe privacy as the protector of choice and even freedom. The more choices you have, the more you can live in the way you like. Restricting freedom will force you to make the choices that others want you to make.

Merchants display goods through big data accurate advertisements, but not only that, their behavior also includes design and guidance. Even if some products are of poor quality, they will let you buy them in some form.

If it is used for some negative behaviors such as cheating and hooliganism, it will be more difficult to prevent.

In most home computers, you can find all the latest family photos, or any paintings and music of the computer owner. You will find the videos this person likes to watch, the songs he likes to play, and the broadcasts he thinks are worth listening to. Blog. You may already know the person who lives in your home, but knowing their activities on the computer can help you understand their psychology more deeply.

To some extent, your mobile phone and computer contain all your information.

Especially stored photos, videos, recordings, files, words, etc.

For ordinary people, the biggest threat is not that a big company in the cloud collects your data indiscriminately, but that people around you monitor you accurately to achieve physical and psychological harm.

If a picture is worth a thousand words, it is better to add sound to it. Almost all modern personal computers have microphones. When they are activated, these microphones can be used to listen to conversations, to listen to you singing in the shower, or to get an in-depth understanding of the mood of the people who operate this computer. A hacker who takes over your computer can turn on the microphone to tell how many people are in the room and hear the discussion around the computer. Most computer cameras light up when activated, but most computer microphones have no visual or other signs that they are listening or recording. Therefore, the microphone is the most secret way to spy on computer users.

It is precisely because it is so secretive that our attention is always focused on the camera.

Although it can't collect richer video information, it can do many unexpected things just in sound.

Biometrics are not complicated machines. In order to build a biometric reader, you only need a data input device, which can continuously read images, videos, sounds and smells or pattern identifiers.

Fingerprint identification is common, followed by DNA identification. Advanced ones include retinal scanning and voiceprint recognition.

For centuries, dogs have also been used to track smells and find suspects.

Monitoring technology may start with programming your mobile phone, laptop or tablet, and snooping with simple applications that can record photos, videos or audio. This kind of monitoring is completely silent and difficult to find. Spies may also buy something that looks like a toy plane or helicopter, start it flying over your roof, and record video and audio for hours like a drone. Plush animal toys, wall power sockets and other easily available daily necessities. U disk, clock, calculator, pen and glasses can all be equipped with chips, which can record images, words, photos and videos.

Everything around you may be disguised monitoring equipment, not just mobile phones and computers.

You can also read the following articles:

How to fill 5000 fans with robots in a month?