laitimes

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

author:Zhanlu culture
"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

Recently, a post about the monitoring of large factories spread all over the Internet, and the post mentioned how large factories monitored how employees were fined, exposed posts were tracked, and online resumes were interviewed.

After this, countless netizens have discussed with the post, and various strange things that have been expelled because of dissatisfaction with the company's monitoring behavior have also been pulled out.

Many people marveled: they thought it was a colleague report, but they didn't expect it to be ubiquitous surveillance! Some people also mentioned that it was just a WeChat message with a friend, and I received a call from the boss.

The most frightening thing in the discussion is not the camera standing on our heads, but the ubiquitous "submarine net".

What is a "submarine network"? Many people are very unfamiliar with this word, and there are not many definitions found on the Internet. In fact, the "submarine network" is more of a metaphor for a potentially huge network, which covers us all in it, real-time monitoring, and no privacy.

No one knows who is controlling the "submarine network", in today's big data era, our mobile phones, computers are all monitored, not only the company's monitoring, but also all kinds of software that peeks at your privacy and obtains various permissions from you, and if you do not agree, the "rogue" software does not allow you to use the overlord clause.

How can we protect our privacy?

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

1. You must set a password

In Defending Privacy, it is mentioned that first, you should use a very long strong passphrase – at least 20 or at least 25 characters, rather than a simple password. Random characters work best, such as ek5iogh#skf&skd. Unfortunately, the human brain has difficulty remembering random sequences. So use a password manager, which is much better than choosing your own password. I tend to use open source password managers like Password Safe and KeePass, which only store data on your local computer.

Another important rule is to never use the same password for two different accounts. Nowadays, passwords are needed for almost anything, so let a password manager help you generate and save one-of-a-kind strong passwords.

Even if you have strong passwords, there are still techniques that can beat you, such as password guessing programs like John the Ripper. This free and open source program that anyone can download works according to user-configured parameters. For example, the user can specify how many characters to try, whether to use special symbols, whether to include a collection of foreign languages, and so on. John the Ripper and other password crackers can use rule sets to arrange password characters, making them very effective at cracking passwords. In short, it will try all possible combinations of numbers, letters, and symbols within the parameters until it successfully cracks your password.

Fortunately, most people don't have to fight against state agencies that have nearly unlimited time and resources. We're more likely to have to fight against a spouse, a relative, or someone we've really annoyed, and when faced with a 25-character password, they won't have the time and resources to crack it successfully.

Recommended reading

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

2. Lock your mail

Most web-based email services use encryption when transmitting messages. However, some services may not use encryption when transferring messages between mail transfer agents (MTAs), so your information is public. For example, in the workplace, the boss may have access to the company's email system. In order to be invisible, you need to encrypt your messages, which means to lock your messages so that only the recipient can unlock and read them. What is encryption? It is a kind of code.

Caesay Cipher is a very simple method of encryption that replaces each letter in a password with a letter in the alphabet that is some distance apart. For example, when using the Caesar cipher, if this distance is 2, then a becomes c, c becomes e, z becomes b, and so on. Using this 2-bit offset encryption scheme, "Kevin Mitnick" becomes "Mgxkp Okvpkem".

Of course, most of the encryption systems used today are much more powerful than any Caesar encryption, so it is even more difficult to crack them. All forms of encryption have one thing in common: a key is required, which can be used to lock and open encrypted information. If you use a sample key to lock and unlock encrypted information, it is a symmetric encryption. However, when two parties do not know each other or are far apart, symmetric keys are difficult to share between them.

Most email encryption actually uses what is known as asymmetric encryption. This means that I have to generate two keys: a private key that is saved on my device and will never be shared, and a public key that I can post at will on the Internet. The two keys are different, but mathematically related.

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

3. Browse without a trace, all your traces will disappear

What if you can't prevent others from spying on your emails, calls, and instant messages, and can't legitimately delete your browser history? Maybe you can avoid collecting these histories from the start.

Browsers like Mozilla's Firefox, Google's Chrome, Apple's Safari, Microsoft's Internet Explorer, and Edge all offer built-in anonymous search options, regardless of what device you want to use, traditional PCs or mobile devices. Either way, the browser opens a new window and doesn't record what you've searched for or where you've browsed on the Internet while the session is on. Close the Private Browsing window and all traces of the addresses you've visited will disappear from your PC or other mobile device. For privacy, you also have to pay a price: unless you save bookmarks for the site while browsing privately, you won't be able to return; because there's no history — at least not on your machine.

Using the Private Browsing window on Firefox or the incognito mode on Chrome, you may feel unbreakable, but your invisibility must pass through your ISP, the Internet service provider, the company that pays for Internet service or cellular service — and your provider can intercept any unencrypted information passed through it. If the website you visit is encrypted, your ISP can still get metadata about the visit, which is when you visited a website somewhere on a certain day.

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

When the website you're connecting to uses encryption, the protocol changes slightly, it's no longer "http", and you'll see "https". This https connection is more secure. One of the reasons for this is that it's peer-to-peer, but only if you connect directly to the site itself. There are also a large number of content delivery networks (CDNs) that cache pages for their customers, and CDNs can achieve faster distribution no matter where you are in the world, so this may appear between you and the target website.

Also keep in mind that if you're signed in to your Google, Yahoo, or Microsoft accounts, those accounts may also record web traffic on your PC or mobile device — perhaps used to build profiles of your web behavior so that those companies can better target the ads you see. One way to avoid this is to remember to sign out of your Google, Yahoo, or Microsoft account and log back in the next time you need to use them.

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

Can your password be easily cracked?

Who else but you is reading your email?

Is your phone just a bugger?

How does the ransomware virus trick you into falling into a trap step by step?

Are you aware of the importance of privacy? What happened without your knowledge?

……

Every time you click and every website you browse, someone will look at it.

Facial recognition, drones, smart connected cars, social networks... are leaking your privacy.

You can run, but there's nowhere to hide!

"Big factory monitoring" angered netizens! Hit the worker: 996 can be put up with me, but don't invade my privacy

Defending Privacy will reveal the truth about the data age: everyone's privacy is on the verge of being leaked. The authors Kevin Mitnick and Robert Vamouss first start from a personal point of view, popularizing the privacy and security methods that everyone should master; and using real stories and vivid cases in life, depicting the 6 most relevant future scenarios related to privacy, teaching you how to master the art of stealth.

Defend Privacy (The World's Number One Hack Teaches You How to Protect Privacy) ¥10.9 Purchase

Read on