laitimes

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

author:Jiangqiao miscellaneous talk

The content of this article comes from the Internet, if it is inconsistent with the actual situation or there is infringement, please contact to delete. This article is only published in today's headlines, please do not move.

Mobile Privacy Security: The Story Behind First-tier Cities

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

Do you think your phone's private information is safe? The answer may not be as optimistic as you think. With the continuous advancement of technology, our lives are becoming more and more convenient, but at the same time, mobile phone privacy security is also being challenged. From April to September this year, the Cyberspace Administration of Shanghai carried out a "special inspection of the collection and use of personal information" on 46 apps with a large number of downloads and complaints, and found more than 160 problems. Among these problems, we found that some apps that we often use in our daily lives, such as Pinduoduo, Xiaohongshu, Himalaya, Bilibili, Dianping, etc., have unfortunately become part of the problem. Although the operators of these apps have completed rectification, can we still feel confident about the security of mobile phone privacy information?

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

The privacy leakage in our lives sometimes does not require complex hacking attacks, or even your subjective will. Let's dive deeper with a real case. Once, the Gusu District People's Procuratorate of Suzhou City, Jiangsu Province disclosed a case. A girl who had been avoiding harassment by her ex-boyfriend suddenly received a news link that she clicked on casually, and this simple action accidentally leaked her location information. Liu, an ex-boyfriend, learned an official account through a friend, and after paying a certain fee, he can obtain the location information of others. So, he sent the girl the news link of this public account, and after the girl clicked on the link, the public account immediately sent her location information to Liu. Liu then found the girl, causing a tragedy. This case shows that even inadvertent clicks can bring privacy leaks, which is a warning to everyone.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

Another case that shows us the pitfalls behind privacy security. In Dongguan, Mr. Cheng, a citizen, received a customer service call claiming that the interest rate of his small loan was too high and that he needed to close the credit line, otherwise it would affect his credit report. Because the information provided by the other party was extremely accurate, Mr. Cheng did not suspect, he downloaded a conference software and turned on screen sharing according to the instructions of the other party. Subsequently, Mr. Cheng was asked to transfer 960,000 yuan from his bank card to the other party's account. Then, they are asked to activate the mobile banking loan line and transfer money again. Only then did Mr. Cheng realize that he had been deceived. Although the public security quickly stopped paying the relevant accounts, Mr. Cheng had lost more than 2 million yuan, and some of the funds had gone abroad. This case illustrates how even a thoughtful individual can lose a large sum of money in a short period of time.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

Privacy security issues can also be impacted in more social ways. Recently, Ms. Zhang in Zhengzhou, Henan Province, received an unfamiliar package containing a notice of course refund from a training institution. Because Ms. Zhang had indeed paid the fee for the training institution for her child, the other party not only knew her address and the child's name, but also knew the amount of her payment and how much she could refund. In a series of subsequent operations, Ms. Zhang was pulled into a QQ group, which was full of refund parents. This series of steps made Ms. Zhang completely lower her vigilance, and in the end she suffered a heavy blow, with a loss of 3.68 million yuan. This case teaches us that even cautious people can fall into the traps set by strangers.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

In response to the problem of mobile phone privacy leakage, some people may recommend that you switch to the iPhone, because Apple's system is not open source and is considered a relatively safe operating system. However, even on Apple devices, security is not absolute. Not long ago, news broke that "Apple Store is now involved in H software disguised as learning software", which attracted widespread attention from netizens. In fact, this is not an isolated case, but a microcosm of many problems. Therefore, how to really ensure the privacy and security of mobile phones is still an urgent issue.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

When it comes to mobile phone privacy and security, some high-end users are more stringent. In order to protect their privacy, they have taken some special measures. For example, Jack Ma, the founder of Alibaba, was photographed placing his phone upside down on the desktop during a meeting to avoid prying eyes. Another woman at the same table also placed her phone upside down. Such an action can effectively prevent prying eyes. Another well-known actor, Zhou Xun, admitted that her old mobile phones were locked in safes. Actor Liu Qingyun revealed that his friends on his mobile phone use code names instead of real names, and sometimes he forgets which code corresponds to which friend.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

Recently, two well-known entrepreneurs, Ding Lei and Wang Shi, have attracted widespread attention because of changing mobile phones. They chose OPPO's new machine because its security performance gave them more trust. In fact, OPPO's new machine uses an independent security chip that has passed the second-level certification of the State Cryptography Administration, providing basic protection for keys and sensitive information. This is the highest level of security chip in the communications industry. In addition, the new aircraft uses the safety technology "island" to provide double protection. This technology protects from the bottom of the system, providing a new security protection for the user's privacy.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

Of course, OPPO is not the only mobile phone manufacturer that pays attention to the privacy and security of mobile phones. BlackBerry is known for its flagship business applications, launching Key2 phones many years ago, with exclusive encrypted servers to protect the phone from external intrusion and surveillance. Samsung has also added advanced hardware security features and a specially optimized secure operating system to the S20 series phones. Apple continues to improve its hardware security measures, including the introduction of hardware-level data encryption capabilities on the latest MacBook computers.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

The issue of mobile phone privacy and security requires both the attention of mobile phone manufacturers and the vigilance of users themselves. Try not to install unknown applications, avoid connecting to unsecured public Wi-Fi networks, reduce the number of pictures of personal privacy information posted on social media, establish the habit of regularly cleaning up the private content of mobile phones, use high-security mobile phones and official security software, and carry out self-information security protection, are all effective measures.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

To sum up, mobile phone privacy security is a deeply challenging issue. Not only do mobile phone manufacturers need to provide more secure devices and operating systems, but users themselves need to remain vigilant and avoid falling into the trap. Our mobile phones are the right-hand men in our daily lives, but they are also the gatekeepers of our privacy. We need to work together to ensure that our mobile phone privacy is adequately protected.

Click on the link to leak the location, scam 200,000! How many unexploded "bombs" are hidden in your mobile phone?

The above content and materials are derived from the Internet, and the author of this article does not intend to target or allude to any real country, political system, organization, race, individual. The above does not mean that the author of this article endorses the laws, rules, opinions, behaviors in the article and is responsible for the authenticity of the relevant information. The author of this article is not responsible for any issues arising above or related to any of the above, nor does it assume any direct or indirect legal liability.

Read on