You can't cancel it. If the loan APP applies for access to the user's address book, the user can confirm it and read it at will. In fact, when installing, it will have the right to prompt the app to apply, but usually users will not read it and agree directly. He also said that if it is not directly accessed by users at all, this situation is rare, and general apps can't do it.
As for the similarities and differences between Apple and Android phones in this respect, Li Juanru said that the Apple system will pop up a prompt, which also needs the user's confirmation. As long as the user confirms that it is also reading at will, this aspect is no better than the privacy protection of Android, and Android depends on the version. Version 5.0 and above, only prompted when installing this APP. After 6.0 and some earlier versions customized by domestic manufacturers, by default, there will be a prompt when there is an access request.
But does this hint really work?
"In fact, the user's address book is very likely to be monitored by the APP, and the behavior of collecting user data is very frequent. Many apps do it blatantly, even if they are constantly prompted, users will agree if they are bored for a long time, "Li Juan said.
Will P2P lending turn to selling users' address books and other privacy?
An online loan industry insider said that even if regular internet finance companies have mastered user data such as mobile phone address books, they will not sell them maliciously, but if the system is hacked, the security of these materials will be difficult to guarantee.
Unfortunately, the security index of Internet finance APP is not high. The Information Security Status of Mobile Internet Finance APP 20 15-20 16 released by the Information Industry Communication Software Evaluation Center of China Information and Communication Research Institute in August this year shows that there are many problems in Internet Finance APP, such as misuse of encryption algorithm, insufficient protection of network transmission, lack of protection measures for applications, and leakage of sensitive information of local files and system logs.
The report shows that 15% of the data interacting between Internet financial app and server is transmitted through clear communication channel, which may lead to the complete exposure of confidential data such as users' financial transaction information and passwords to attackers. After the attack is successful, the hacker can not only monitor all the transaction information of the user, but also tamper with the transaction content and even impersonate the user to log in to the transaction.
In addition to hacker attacks, the phenomenon that insiders leak customer information after leaving their jobs also poses a threat to user privacy. Employees of an online stock trading software company told the newspaper that many users of the software reported to the company that they were harassed by similar product sales calls. After investigation, it was found that the reason was that an internal salesperson sold his responsible user address book to a rival company after leaving the company, and then the software company called the police.
Second, how to cancel the micro-loan after reading the address book?
As long as you don't authorize the address book, you can open it. You can't cancel it after reading it. If you are not allowed to read the address book when you apply for a loan, then your loan will be impossible. Online loan guarantees that you can recover the money at two points, one is to collect credit information, and the other is to inform relatives and friends to force you to pay back the money.
Third, the mobile phone loan has been read from the address book. Can I cancel it if I record it?
cannot
Fourth, the mobile phone loan has been read from the address book. Can I cancel it if I record it?
Yes, as soon as this software reads the resources, it will be backed up to the terminal immediately. She can't delete it, and it is very likely to steal your other information. There is no way to delete this software cleanly. Even if the mobile phone is formatted, it can only remove its permissions on your mobile phone, and there is no way to continue stealing it, but it is likely to revive if it is updated.