Traditional Culture Encyclopedia - Weather forecast - Why does software have to attack user privacy? Another batch of software involving user privacy has been notified by name.

Why does software have to attack user privacy? Another batch of software involving user privacy has been notified by name.

The software named this time is not as unknown as before. Because it includes QQ input method, UC browser, ink weather and other well-known software, it is hard to prevent. What did they do?

This is a common routine on computers before. For example, if you want to download a song, he tells you that you can only download it with the software he provides, or click Download to jump to other pages.

This method of downloading the APP is either for your own software promotion (installed capacity) or to help others promote the APP (there is a problem).

Many years ago, some people appeared in the mobile phone market, looking for mobile phone wholesalers and retailers to talk about cooperation. They provided you with several APP installation packages. You just need to install them in the mobile phone you sell. After activation, they will give you an installation fee of US$ 3~5 yuan for each installation and three installations 10 yuan. Selling 10 mobile phones a day will increase the net profit by 100 yuan, causing crazy installation.

Interested, directly order a batch of mobile phones from mobile phone manufacturers and ask to install the specified software. After the goods are mentioned, they are dumped at a price lower than the wholesale price 10~20 yuan, that is, the unopened mobile phone has been implanted with software.

The software they install will not only gain the privacy of users, but also run in the background of mobile phones to steal traffic, and can also be shared with operators for one month and one year.

9.QQ input method, illegally collecting personal information.

Many friends may wonder, Tencent QQ, WeChat mobile phone binding, browser, game real-name authentication and so on. Take a little from each software. What personal information do I have that he doesn't have?

In fact, their internal software is operated by an independent project team, and the user data is also independent. Although these projects will cooperate, they usually don't like the data. The biggest time to enjoy the data is when WeChat comes out. Ma Lao asked the QQ team to help his little brother, so he got the recommendation of "contact friends" and "QQ friends". Without data association, WeChat is not so easy to get up, and the edge is also one of the important reasons why other chat software is unable to die.

So, for an input method, what is valuable to users?

Habits, input habits, word usage habits, expression habits, etc. Only by constantly recording and testing will he know what DX you entered, or what it is? Object? Thank you? He will analyze what you entered before to guess, push you the right content for you to choose and try again and again. Finally, when you start, it will help you complete the following content, which you will find useful and keep.

20. Ink weather, collecting personal information beyond the scope.

Speaking of this software, I can't help but think of a creative WIFI master key, but the fate is the same. Although I have gained a lot of users, my core value is too single and my liquidity is too poor. There is no difference between life and death, because I can't make money.

Collecting out-of-range personal information may be to find a possible way. Many softwares think and do this, but I hope they don't do evil.

Let's talk about the WIFI key. He recorded the wifi password of each connected router, and Qian Qian 100% valid password is in his hand. If a password dictionary is written to crash the library and the bad guys get it, it is a major network security accident or a major social event. Do they have the ability to keep this Z-bomb in their arms?

Protecting personal privacy is what each of us should do, and we can't count on the conscience of enterprises because they want to make money.

All the above are personal opinions, please point out if there is anything wrong.

#26 Application Nominated #