Current location - Loan Platform Complete Network - Big data management - Big data eavesdropping off
Big data eavesdropping off
Open the takeaway APP, and the system automatically recommends food;

Open the information APP and the system will automatically recommend news;

Open the travel APP;; The system automatically recommends tourist routes.

Every time you talk about the degree of understanding of our personal information by various apps, you will feel that the algorithms of Internet companies are really powerful now. By integrating everyone's shopping information, search records and other online traces, we can form a complete portrait of users and even evaluate and predict our behavior patterns.

But have you ever thought that maybe you haven't searched for related topics on the APP at all?

Isn't it a bit "scary" to think like this? I haven't started searching myself, just said it. How does the mobile APP know what I want to do? Can't it put a "scanner" in our brain?

Some netizens reported that they just casually said "plums are delicious" on the train, and Taobao quickly pushed the product introduction.

According to relevant media reports, many apps care about our lives because they "eavesdrop" on our lives: when these apps are installed, they will silently open the microphone permissions of our mobile phones.

APP is trapped in "eavesdropping"

Some people may say that the mobile APP is just a functional software that meets our special needs. There is no need to spy on us. Are you too sensitive?

Not exactly. An APP can monitor the sound of the surrounding environment and upload it to the server after obtaining the permission of the microphone of the mobile phone. After the information is processed by the server, it is bound with the user to realize the real-time and accurate docking of user data by the enterprise.

A recent evaluation released by the Shanghai Consumer Protection Committee shows that there are not a few apps that engage in such "small moves" privately: they apply for a large number of sensitive rights to obtain information, but the actual function of the app has nothing to do with this information.

Among these eavesdroppers, the most familiar one is probably hungry. After all, many office white-collar workers rely on it to solve their food and clothing. But in fact, "Hungry" not only plays an important role in our eating, but also applies for 1 1 permission, including turning on the microphone, making phone calls, checking the calendar and so on.

For "hungry", it's not just "eavesdropping", but also "making a phone call and checking the calendar" The netizen questioned: "I just want to order takeout. Why do you want to check my calendar and phone? "

User information reflects life details.

In fact, in addition to "hungry", the Shanghai Consumer Protection Committee found in this evaluation that many online shopping apps applied for the right to "view calendars" when they were installed. In this regard, the company affiliated to APP explained that this behavior is to remind users to participate in activities such as APP promotion through calendars.

But in fact, we all know that promotion is not the real purpose of APP to apply for permission to view calendars. In real life, many people will record their daily life on the calendar, including personal information, family information, life details and even business secrets. Moreover, the average user's sensitivity to the mobile phone calendar authority is relatively low, so many apps take advantage of this and apply for authorization, so that user information can be easily obtained for the company to further develop its business accurately.

The situation of information protection is grim

In fact, the saying about "APP eavesdropping" has always existed abroad. Social giants such as Facebook and search engine Google have also suffered similar criticism.

In the era of big data, data is king, the competition among enterprises is becoming more and more fierce, and the granularity requirements for consumer data are becoming more and more detailed. Each of us is labeled with data, and all the data are aggregated to form a personal portrait, which may be more accurate than you think.

Not only "eavesdropping", making phone calls or checking calendars, but also the active "stealing secrets" of enterprises can easily lead to the disclosure of our information, that is, when people use input methods every day, information may be obtained by input method manufacturers; Looking at any product while shopping and staying on the page for three minutes or one second may also become the basis for enterprises to "hunt" us. In this case, how consumers protect themselves and how enterprises protect consumers' personal information security to the greatest extent are very serious problems.

Self-protection and constant vigilance

To solve the above problems, it is imperative that, on the one hand, the Internet platform should be strictly self-disciplined and effectively safeguard the information security of consumers; On the other hand, the relevant regulatory authorities should also put the platform management in place, decisively show their swords to the wanton big data mining behavior of enterprises, timely introduce relevant laws and regulations, and effectively implement supervision and control.

For us ordinary users, it is better to operate and implement, or to improve the awareness of information security protection. Here, the concept of confidentiality provides you with several suggestions on information security:

First, it is recommended to cover the computer camera with stickers. Many network professionals installed recordings on computer cameras and microphones to prevent eavesdropping and monitoring, including Facebook founder Zuckerberg and former FBI director james comey.

Although the method is a bit corny, it is very useful.

Second, choose sensitive permissions carefully. The mobile phone we use is usually Android or Apple, and there is a "privacy" option in the mobile phone settings. If you are not at ease, you can cancel the authorization that is not closely related to the functions of the APP before using the APP, such as the camera, microphone and calendar permissions that are easy to invade privacy.

Third, use sensitive apps cautiously under public ***Wi-Fi. Many hacker intrusions occur when hackers control the Wi-Fi environment. Therefore, when using public Wi-Fi, it is best to avoid using apps that may lead to information leakage, such as financial apps such as banks and Alipay, and not to log in to accounts or transfer money. Even if you use home Wi-Fi, try to set complicated passwords and keep changing them frequently.

Part of the data comes from the Internet.

How to deal with the network security challenges in the 5G era