Chapter 531: A member of the red eye disease

In fact, at this moment, there are definitely not a few people who are staring at the COS operating system and KT mobile phones.

There are many, many people staring at the COS operating system, among which there is a very famous company, saying their company name, maybe not too many people know, but when it comes to their products, it is definitely known to the entire Chinese people, that is, 360, a security software, can also be said to be a security application.

Qihoo!

It's this company, a company that has a good reputation now, and in the future, it will become a company with a bad reputation.

There are many, many reasons for this kind of thing, but what Tang Hao knows is that there are many insiders in it, and one of them cannot be ignored, that is, the competition between 360 and the Penguin Group, regardless of whether it is right or wrong, it is said that 360 wants to challenge the status of the Penguin Group.

No, it's not that simple, the so-called no wind and no waves, if there is no reason for this, it is impossible for the two companies to fight, among which there are many rumors on the Internet, saying that it is the Penguin Group that provokes the trouble first.

And in the final analysis, it is not clear who provoked it.

As far as Tang Hao knows, that is, 360 company is not very good, this is his intuitive impression, and it is also reasonable, first of all, 360 company has added a program to their security software, this program can monitor the Penguin Group's instant messaging software.

To put it bluntly, it is a computer, which installs the Penguin Group's instant messaging software, and also installs 360 protection software, and then the Penguin Group's instant messaging software needs to pass guò360 protection software, that is, all the numbers are monitored by 360.

This is surveillance, which means if needed. 360 can access the number of Penguin Group's instant messaging software at any time. This is a matter of security. That's the biggest damage for the user, and there's a lot of other stuff, lots and lots of them.

360's products have a cloud, and they use this cloud to control what they want.

This kind of thing undermined the safety of users and at the time, it also posed a threat to the Penguin Group. In this case, how could the Penguin Group be good at doing it, so the two fought.

When the trouble is the strictest, it is a computer, you can't install two software at the same time, the user can only choose one from it, anyway, if I install this, I can't install that, and I install this. That can't install this.

The user is not given the right to choose at all.

This is the rhythm of killing a thousand enemies and losing eight hundred. But what led the two companies to go down this path?

If things don't go too far, I'm afraid there will be no such thing, it is precisely because of the competition between the two companies, the result is that there is no right or wrong, there is commercial competition, the difference is that this kind of competition is no longer benign competition, but vicious competition.

Vicious competition is not good for anyone.

Tang Hao's views are certainly biased, but sometimes, things can't be seen on the surface, maybe one company can try to destroy another company, for example, Penguin Group's destruction of 360, all of them are negative news, but if people are clean, how can you resist it.

It is precisely because you have on your body, and it is you who steal the user's information through a series of means, which will make people resist.

A lot of negative news about the 360 company, which has vicious competition, and the user also took 360 to court, which caused a very sensation in the previous life, and the story happened because a user was curious, and asked a hacker friend to help him look at the computer, and as a result, a series of tests were taken down, and all his information and materials, including the operation records of the computer, were uploaded to an unknown place.

That's the clouds!

Online shopping, and some others have been uploaded, which is even the theft of their own bank information, which is definitely not a trivial matter.

In other words, if you steal someone's bank information through a browser, it means that if you want, you can transfer all the money in their bank, and if such a thing happens, it is definitely no longer a small matter, but a big thing.

360 has done this before, and it has been exposed.

Of course, the final thing is not settled, and no one knows if it ends.

360 does this, but what about other companies?

Penguin, do they do the same?

The answer is unknown, but it is also true that the Penguin Group has not been exposed, and perhaps they did, but no one was caught.

Some things are secret and cannot be made public.

And to do these things, it is done through the clouds.

This is also the real reason why Tang Hao is wary of the cloud, the cloud can accomplish a lot of things, it has huge benefits for the Internet, and the disadvantages are also great, people who don't know don't think much about it, and people in the feasible area know that the cloud is really afraid sometimes.

That's why the advent of fingerprint systems has attracted a lot of attention.

Penguin Group is the same, and Ma Yu is the same, both want to introduce the fingerprint system, integrate it into their applications, and strengthen protection, because the cloud system can be in their hands, but it does not mean that their protection is absolutely safe, if criminals are allowed to invade and use it, they will be doomed.

But, one way or another, those are not insured.

Huafeng returned to Qihoo and 360.

The application platform of the COS operating system does not have the application of 360, and the 360 company is also very optimistic about KT mobile phones, but Tang Hao refused to cooperate with others, and as a behemoth, how could he be willing, because all the benefits were taken away by their competitors.

No, secretly, a large number of people have gotten together, and what they do is to crack the COS operating system, and they want to make a jailbreak COS operation system.

Once the jailbroken operating system appears, then the 360 application can log in to the COS operating system generously, so that Tang Hao's blockade of their 360 is completely useless.

Now, several months have passed, but the progress is very slow, it is too strong to keep secrets, and the COS operating system with a KT mobile phone is very tightly blocked, no matter what, it is impossible to bypass the fingerprint system and people's encryption.

The jailbreak version of the COS operating system is being studied, and Tang Hao is not very clear about the progress, but he knows that once the jailbreak version appears, there is a huge danger for the COS operating system and KT mobile phone, this is the first person to target him, and it will not be the last, but it is only a certain one, which is on the surface

(To be continued......)