Chapter 461: The Dao is one foot high

The so-called "Bee Call Security Master" is actually an upgraded version of "Bee Call", and the "manufacturer prepares a deposit of 100 million yuan, and if you are deceived, you ......will be compensated immediately" in the loudspeaker is the latter's "loss first" commitment.

"Call Master" has a recharge of 100 million yuan first compensation fund, but the requirements for users are also very high, so it did not implement the full platform release strategy as usual, but only launched the bee system and elephant system version, and only the Chinese Simplified Chinese version dedicated to serving users in mainland China, and it is also a public beta version.

Bee system users need to manually open the Bee number pass app, read and agree to the call master use agreement, and choose to grant the app permission before they can install the app, and the number pass will continue to be updated and upgraded, but there is no any form of "loss compensation".

As for the elephant system, it itself is a special and special beta version of the Android system, the user has read and agreed to use the agreement before flashing, otherwise the flashing operation will automatically end and the system cannot be installed.

Bee is trying to launch a package solution, where users pay for trust and a part of their rights, and Bee provides them with more robust protection against fraud. However, in the promotional advertisement of this Zhixin communication mobile phone store, this "beta application" has become the core selling point of Bee mobile phone, and it is not difficult to imagine that the store will definitely help users upgrade and install Call Master for free, so that it will automatically become a test user of Bee.

Judging from the fact that customers are constantly entering and leaving the store, ordinary users don't seem to care about permissions and privacy.

Seeing this, Atletico Madrid is already considering further easing restrictions after returning and launching a truly fraud-proof "Bee Secure Phone" plan.

At the beginning, because of the increasing number fraud and advertising harassment of 170 mobile phone numbers, many people saw that the call starting with 170 was regarded as a malicious call and hung up and refused to answer, which will inevitably endanger the reputation of their 17097 bee card in the long run, so Bee specially marked the 097 number segment in the caller APP to provide additional guarantee for bee card users.

And then they really want to lose money.

There is a way that is one foot high and one foot high, you have a good plan to "strictly issue cards", and I have a wall ladder to "collect cards at a high price".

Although Bee Communications has done a lot of security reviews when issuing cards, giving priority to developing Bee users with real-name authentication and good historical performance, and striving to ensure that every bee card is issued to safe and secure users, they cannot avoid preventing bee cards from flowing into the black market and being used by others for illegal purposes.

Compared with "selling points at a high price", the "security" of "selling cards at a high price" is undoubtedly several levels higher, although after paying the victim's losses quickly, Bee Communication found the head of the bee card holder through the registration information in his hand, but the claim was easily said by people "lost the mobile phone, forgot to report the loss" to a push 625.

Even if it is the only traffic management department in the country, it cannot completely eliminate the behavior of people who use their driver's license to help other illegal vehicles evade punishment for compensation, let alone an ordinary company like Bee?

Threaten to blacklist me and refuse service in the future?

However, it was also because of the losses suffered by these people that Atletico Madrid got on the bar with them and embarked on the road of anti-fraud.

The biggest difference between Bee and other peer companies is that he has a "brain" that can hold all the information, and he can process various events much faster, and there is no other procedural, process, and bureaucratic large company disease of other large enterprises with 10,000 or 100,000 people.

Therefore, the "loss first" guarantee privilege for bee card users was canceled just over a week after it was launched, and then the powerful version of the "Call Security Master" made its debut.

In the past, the number pass was mainly through the "number attribution display" and "user interaction tag" two functions to escort users, but practice has proved that they are more and more powerless to deal with the increasingly mature and powerful "telephone fraud industry", but sometimes help abuse, because the basis of the realization of these two functions is the number provided by the caller ID function, which can only help users mark the "+ 13800138000" is a fraudulent call from the United States, but can not distinguish the true and false "106" number.

The previous phone numbers are not remembered by ordinary people, and they may be regarded as mobile official numbers to reduce their vigilance and unfortunately fall into the trick, but the software can easily see the problem by comparing the database. This number is actually "+1 (380) 0138000", which is a transoceanic call from the 0138000 number in the United States (international area code +1, 001) 380 region (in fact, it does not exist), and it has nothing to do with the mobile SMS center.

However, for fake numbers such as "010110" and "95555" modified by using number change software, there is no way to do it in the database of number pass. This is because there is a "technical loophole" in the operator's caller ID service, and there is currently no reverse verification mechanism for the caller ID from other partner operators. The operators themselves don't know the authenticity of the number, and the mobile app is of course even more unlikely to know the authenticity.

Fortunately, it is not completely impossible, the phone that supports "number change" must be a VOIP network phone, which initiates a call through the IP network, and naturally does not need a fixed phone number, and the caller number can be made up at will. Similarly, because the caller ID is arbitrarily coded, such a number naturally does not support callback.

Whether it is the popular Microsoft Skype VoIP phone that swept the world, or the long-distance call that floods the streets and alleys, they all have one thing in common is that "they can only make calls, not be called", this is because they are all VoIP phones, and they do not have a fixed phone number and certainly cannot support callbacks.

Therefore, the "call master" uses this feature to identify the Internet phone, when the software detects the suspected Internet phone, the mobile phone will automatically call back the phone after the user hangs up the phone, if it is the Internet phone natural callback failure prompt empty number, if it is a normal phone number, it will automatically hang up and will not generate additional phone charges.

Of course, even if there is an automatic hang-up mechanism, if the opposite side uses software to answer in seconds, it is still possible to generate phone bills, which is why Bee does not plan to directly launch the call master now, you need to test it on a small scale first, otherwise the phone fee generated is too much, and it is not enough for them to have a 100 million first compensation fund.

This trick can theoretically also be used to identify fake base station scam text messages, when the mobile phone is interfered with by the fake base station, it will not be able to send text messages and make calls, and can only receive free text messages sent by the latter.

The pseudo base station takes advantage of the verification mechanism loophole when the GSM mobile phone communication protocol automatically switches to the base station, disguised as a "better base station with a strong signal", induces the user's mobile phone to automatically connect with itself, and then sends a pre-prepared short message to it.

According to relevant statistics, 70% of the content of these text messages is to impersonate the operator, using "sweetness" such as the redemption of phone credit points within a limited period and the manual application of free traffic to induce users to click on malicious websites; the remaining 20% are impersonating banks to use interfaces such as "system upgrade" to let users open fake phishing websites; and the rest are other blackmail text messages and various "free advertisements".

In the past, the use of SMS group sender had to pay the call fee to China Mobile Unicom Telecom, and it was easy to be intercepted by the latter's content filtering system, and the cost of using pseudo base station group SMS was so low that only equipment depreciation and electricity costs were paid, which can be said to be costless. The only problem is that the pseudo base station can not use the "tall" base station antenna, and the transmission power is limited and can only cover a small area.

Usually when the user hears the SMS ringtone and takes out the mobile phone to check, the connection between the mobile phone and the pseudo base station has been automatically disconnected, and the mobile phone returns to normal, and can send and receive text messages and make calls.

In fact, the impact of the fake base station on most mobile phone users is not great, after all, text messages are always sent in one direction, and the victim needs to "cooperate" to open malicious websites and download malicious applications, and scammers also need to go through some operations to get money, and mainstream mobile phone browsers such as Bee Browser have fraudulent website blocking functions, which can reduce the impact of most fraudulent websites.

It's just that I feel a little irritated by harassment from time to time, but unless the national legislation prohibits the GSM communication protocol, this problem will not be eradicated at all, unless China Mobile Unicom is abandoned and goes to the arms of Telecom. Just as banks can only eradicate the growing duplication of bank cards by abolishing magnetic stripe cards and replacing them with a new generation of IC chip cards.

Of course, CDMA and IC bank cards may still be cracked, but that is a matter of the future, and there will naturally be more advanced and more secure communication technology and identity authentication technology.

As for now, the call master can only minimize the impact by adding an SMS filtering system on the mobile phone to automatically identify the common sentence keywords of fraudulent SMS.

However, if you encounter a user who is convinced of the heavenly jackpot, people insist on opening a malicious website browser and can't stop it, or even find an ATM machine to send money to the scammer's account without inquiry, even if there is a secure communication protocol, bank card and browser, it still can't stop the scammer's claws.

Especially now, scammers are constantly summing up experience and keeping pace with the times, and after discovering that the "traditional" phone bill and traffic jackpot can no longer deceive users, they have developed more advanced scams.

In the information age, traditional deception has taken on a lofty name: social engineering.

Originally, social engineering refers to the use of engineering concepts and modern technology to solve social problems.

However, in the field of hacking, social engineering refers to the use of psychology and sociology and other techniques to "hack into other people's brains" in order to obtain various valuable information. When using social workers to invade, they do not rush to scan the website for vulnerabilities and find opportunities, but first search for all clues related to the website, and finally obtain his account password in other small websites and other places that the webmaster usually frequents, so as to complete the intrusion.

To put it simply, social worker intrusion is aimed at people's thinking logic, trying to find the information contained in the blind spots and habitual behaviors, and thus profiting. Therefore, all kinds of scams, especially telecommunications fraud, which use high-tech equipment, can of course also be counted as social worker intrusion.

For example, some phone scammers will use software to call users in groups, and hang up when the user's phone rings, and many users, especially those who often need to answer the phone, will subconsciously call back the missed call, so as not to miss various business calls, and as a result, they will fall for the trick of the scammer, not only wasting their time but also wasting their phone bills.

This kind of scam is difficult to deceive people after the popularization of various "number pass" applications, and everyone will naturally hang up decisively when they see the prompt that "the number was marked as a scam call by 36 netizens".

But the crooks have developed new tricks.

After finding that the winning phone is not very good, now there is a new kind of deception, after connecting the phone, there is a vague "Dad!Mom!", and the general parents are concerned about the subconscious will call out their children's names to confirm, so the scammers successfully get (get) the child's name. A few minutes later, a scam text message with the words "Dad, I'm xx, I was arrested by the police for opening a room with my girlfriend, and I have to pay 5,000 yuan for bail before I don't tell the school ......" will be sent to the victim's mobile phone. With a specific name, the chances of scamming people will increase significantly.

In response to this kind of deception, Bee Call Master has specially launched an upgraded version of the call recording function "Contact Voiceprint Library", which can help users generate their own children's voiceprint library on their mobile phones, automatically identify the identity and emotions of the callee, and avoid being deceived by scammers who misidentify their fathers.

However, limited to the bitrate of voice calls, the accuracy of this function is very average, and it can only be used to exclude outsiders from impersonating, and it can only mean that there is nothing that can be done about my own recording.

And this feature, like the call recording feature, violates U.S. law, which is why Bee hasn't launched a version for Call Master other than Simplified Chinese.

According to U.S. law, it is illegal to record the content of the call between the two parties without the permission of the other party, so iOS, WP, and even native Android from the United States do not provide the call recording function. Of course, users can also achieve this function by cracking the mobile phone system security recording plug-in.

Domestic users don't have to worry about this, domestic Android phones and bee phones have their own call recording function, which is naturally the result of manufacturers paying attention to user needs according to local conditions.

Android is open source, and Bee is domestic, which naturally will not affect them to launch this convenient function. For mobile phone users, please visit http://m.piaotian.net