laitimes

How does the digital world guard a sense of security? Vivo gave its own answer sheet

How does the digital world guard a sense of security? Vivo gave its own answer sheet

Image source: Visual China

2021 is coming to an end. The hottest topic in the tech industry this year is undoubtedly the "metacosm".

Giants scramble to lay out the metaverse, facebook even directly changed its name; adventurers in the metaverse to make "land" and "works of art" at sky-high prices; the game and film industries also took turns to show the public what the metaverse looks like - a series of works such as "Ready Player One" and "Out of Control Player" have successively allowed the audience to experience the "future life" in advance.

Today, the question that is already approaching us is whether humanity will finally enter a world of "true Internet"? So how will the various cybersecurity crises in the film affect the future of mankind?

"Security", the lowest need, the highest goal

As human beings "move" more and more information about life and means of production to the Internet, information security and property security in the online world have become more and more important.

On the world's major trading platforms, virtual assets such as virtual land, virtual clothing, NFT avatars and artworks continue to rise, which is difficult to say that there is no bubble component, but it does make the Internet security industry face unprecedented challenges.

How does the digital world guard a sense of security? Vivo gave its own answer sheet

Compared with the real assets that can be seen and touched in the real world, the essence of virtual assets in the network world is code and algorithms, which makes their security problems a headache for the world. These "futuristic" concepts map to the reality that our personal privacy, user data, and digital wallets— hackers in The Matrix— can target Bitcoin, as well as each of our data and assets.

At this year's CCTV 3.15 evening party, the "black production" of mobile phone security was exposed - countless APP and mobile phone web pages under the banner of "security guard", using sensational "viruses" and "security loopholes" and other reasons to induce users to download, but the actual purpose is to steal users' privacy and even endanger the safety of users' property.

In the face of such opportunities and challenges, while the government has accelerated the improvement of relevant laws and regulations, some software and hardware manufacturers are also taking the initiative to build an industry security system to provide a more secure network environment for users and developers.

How does the digital world guard a sense of security? Vivo gave its own answer sheet

Coincidentally, it is also at the end of this meta-universe year, at the 2021 vivo developer conference held recently, vivo officially released the "OriginOS Security White Paper" to the world, standing at this special point in time, showing users and the industry its ability to protect security and privacy, and thinking about the security of the future network world.

The last line of defense for cybersecurity

As a mobile phone manufacturer, vivo's release of the OriginOS Security White Paper is unshirkable and of great significance.

In the era of mobile Internet, mobile phones, as the first entrance to the Internet, have become a place of contention for information security. Mobile phones have played the role of "Key Mr." in people's life and entertainment, office, home, travel and so on.

Taking vivo mobile phone as an example, the cross-platform seamless collaboration ability it provides allows mobile phones to freely link pads, PCs, projectors and other terminals to achieve data sharing and seamless circulation of office tasks; and in the home scene, vivo has opened up more than 60 smart home IoT manufacturers and become the connection center of smart homes; at the same time, the smart car keys and vehicle-machine smooth connection functions provided by vivo mobile phones have also brought new ecological services and product experiences to the majority of car owners.

It can be found that in many life and work scenarios, mobile phones have become the final interface for network and human interaction, and at the same time, once faced with network attacks, mobile phones have also become the last line of defense of network security.

The OriginOS Security White Paper details how vivo develops the most stringent privacy protection system and security compliance principles, and acts as the last line of defense for user network security through the technical cooperation of hardware layer, system layer, application layer and cloud service, guarding the user's information and privacy security.

How does the digital world guard a sense of security? Vivo gave its own answer sheet

At the hardware level, the secure boot verification, key, and device proof of vivo mobile phone are solidified in hardware, ensuring the safe and reliable operation of the device to the greatest extent, and at the same time ensuring that the data is not maliciously overwritten or tampered with through secure elements and secure storage hardware.

At the system level, in addition to providing a secure and stable execution environment, Origin OS pays special attention to the biometric authentication process - usually the error recognition probability of fingerprint recognition is about 1 in 50,000, while the two-finger authentication scheme provided by OriginOS will reduce the error rate to 1/2.5 billion. At the same time, whether it is fingerprint recognition or facial recognition, the data identification comparison will be destroyed immediately, so that hackers cannot obtain any biological data information.

At the application level, OriginOS' AI-based application behavior monitoring can identify counterfeit applications and malicious applications, directly blocking the path of fraud and harassment that users are most worried about, and can protect the security of electronic licenses, electronic payments, intelligent interconnection and other applications at a high level.

Through cloud services, vivo can detect account abnormalities in real time and encrypt and store sensitive information.

From the user's actual experience, it is that privacy is more secure - "application searchlight" realizes the visibility of application behavior, positioning, audio recording, video recording and other actions at a glance, the user has the absolute "right to know"; "atomic privacy system" allows users to switch to a private privacy space by tapping fingerprints.

There are also security features such as privacy removal when sharing pictures, anti-screenshot recording, camera detection and so on, all of which directly solve the user's "pain points".

Reading through this white paper, it can be found that hardware manufacturers represented by vivo have launched this "tough battle" around network information security. vivo has established the basic principles of Internet privacy protection: 1, transparent and controllable, the use of private data can be viewed and controlled; 2, the privacy side of the processing, private data does not leave the device; 3, data minimization, data collection, data processing and sharing, must comply with the minimum necessary principles.

How does the digital world guard a sense of security? Vivo gave its own answer sheet

"Data security and privacy protection is the basic rights of consumers, is the cornerstone of enterprises to gain consumer trust, we must take data security, privacy protection and compliance as the red line and basic bottom line that enterprises must never touch in their R&D and business activities." This is the attitude and strategy of vivo security and privacy protection, and it is also the goal that the entire industry must make unremitting efforts to achieve.

In the past days of the mobile Internet, we have experienced a period of "barbaric growth", in which network security and privacy protection have been ignored to a certain extent, resulting in a series of problems. Today, there are still many challenges on this road, but the release of the OriginOS Security White Paper may become a signal to see the efforts and self-discipline of industry leaders.

If practitioners in the whole industry can practice their responsibilities and jointly create a good development environment, then the apocalyptic scene brought about by the development of science and technology in "The Matrix" will never appear in real life, and mankind will move towards a more "secure" future world. (This article was first published on titanium media App)

Read on