Chapter 352: Who's Peeking at Me?
Ye Fei took out another piece of information and said: "Our risk control team has just finished testing the Apple version and Android version, and the results are unexpected. ”
"Covering the most popular e-commerce, social networking, video, music, finance, lifestyle, travel and other fields on the market, the results show that only nine apps do not trigger the clipboard reminder. ”
"WeChat, Gome, Amazon, Zhihu, Flush, Meituan Takeaway, Dingdong Food, Ctrip and Didi Chuxing. ”
"Of course, our APP goes without saying!"
Shen Feng took a deep breath, took the report and studied it carefully, even Taobao Jingdong Suning Meituan?
"Even when you copy and paste in any app on your iPhone, when you open something else, it may be read at the first time, but you don't know it. ”
Ye Fei said: "Copy a piece of related information in the memo that comes with the iPhone at one time, including sensitive information such as name, phone number, home address and ID number, and complete the paste action in the memo. ”
When opened separately, there will still be a security prompt of "XX App copied from memo", and after multiple tests, it was found that the result was the same as the above test, indicating that the clipboard would be read. ”
"Because for apps, the clipboard is a good tool, for example, after Taobao and Douyin links are rejected by WeChat, they use passwords, QR codes and other forms to achieve jumping. ”
"Douyin and Taobao will identify them first, and those with their own special logos will upload relevant videos or products to match on the cloud, and return the results to users. ”
Ye Fei knew that the boss was not from a technical background after all, and explained: "I think the second paste is the biggest risk, and the biggest potential risk of the clipboard is not the first copy and paste, because most of the content in daily life is for the convenience of users to provide information to the app." ”
"The real risk is that after the user has copied the content and pasted it into application A, the copied content is not recycled, and the content can still be obtained when application B is opened, resulting in the continuous risk of leakage of sensitive information. ”
"You can keep it up to twenty times!"
Shen Feng was frightened, fortunately he didn't have the habit of writing a diary, otherwise......
Ye Fei took a sip of tea and continued: "Apple is better, Android is even worse, there used to be an APP that was accessed more than 20 times in a row for up to two minutes!"
"This is also the biggest reason why domestic Internet companies are always criticized by foreign countries, to put it bluntly, three words......
"Get used to it!"
Shen Feng nodded, I don't know much about technology, but from a legal point of view, whether there is actual infringement depends on whether the App will upload and retain the user's personal information after reading the clipboard?
Ye Fei said: "Apple's clipboard has always been considered more secure than Android. Because on the iPhone, when you copy a new piece of content, it will directly overwrite the previously copied content. ”
"Android phones will keep more content on the clipboard, so you can often check the clipboard history in places such as input methods. ”
"Of course, in the past two years, Android has also begun to pay attention to privacy protection, and many launches are cleared every few seconds, but the road is one foot high. ”
"Apple's purpose with this update is not only to remind users who is following me, but also to warn developers not to play too far. ”
"In general, the App cannot be a demon, and cannot perform any operations that have an adverse impact on other applications, operating systems, and users, unless you have functional requirements. ”
"For example, if you don't turn on GPS, you can't use Baidu Maps and Didi taxi, and if you don't turn on voice input, you can't use WeChat, phone and other ......."
"If an app wants to get more data, it needs to apply for permissions from other applications, operating systems, and users, and only after obtaining permission can it obtain their data and functional support. ”
Ye Fei explained: "If you don't give permission, these apps will strike and lie down, saying that if you don't let me go through the back door, you won't be allowed to get in the car." When you see it, you can't help it, so you have to give him all the permissions you need. ”
"I often ignore a question, that is, is the reason why the app is asking you for permission, is it reasonable?"
In the next half an hour, the expert made Shen Feng understand what shamelessness is!
If an e-commerce platform wants to know your location information and you reject it, it doesn't matter, you will always open your location permission to a certain social platform and a certain travel platform, right?
After these platforms get your location permission, they start to act, quickly call their own background data, advertising platform data, third-party data platform data, etc., and analyze your behavior trend at this time: Enough play, want to roll back to work?
Immediately find a few products that will be used by 90%: air tickets, decanting soup, wind oil essence, but many merchants want to sell these products to you, what should I do?
The bidding system will stand up and start the auction - see no, this person is going to see this advertising space in the next second, which of you gives the highest price, I will let whose product appear in front of him, after 0.01 seconds of competition, the big airline wins, so you see an advertisement about ticket promotion.
Who is the one who reaps the benefits of the whole process?
Of course, it's an e-commerce platform!
All platforms have exposed your location in the data mart, although it will not be directly exposed, but after multiple data flows, an e-commerce platform will locate it at once according to your device number, memory information, etc., and this location information is yours.
According to Ye Fei's words, this bit of cattiness is not even an unspoken rule!
The big factory is okay, after all, it still needs to be faced. If the information flows into the database of the black and gray industry people who specially reserve personal information, the jargon is called the social worker database......
A minute will make you deeply understand what is called big data!
What is the partnership model, fee model, and employment sharing ......
The data will be used in precision marketing, online fraud, etc......
It is conservatively estimated that the number of employees exceeds 1.5 million, and the market size is as high as 100 billion!
Billions of account passwords are controlled by the black and gray industry, and the industrial chain derived from number theft makes an annual profit of 10 billion yuan.
"Hey, no way, if the app doesn't mine user data, it will be difficult to obtain user pain points and preferences, and without insight into user pain points and preferences, it will not be able to provide suitable products and solutions, and it will not be able to create business value. ”
Ye Fei said helplessly: "In terms of advertising, an important source of revenue in the Internet industry, after the APP collects your information, it is not just you who is engaged in precision marketing, but the people who have a relationship with you and belong to the same type of people as you.
:。 :