Chapter 244: The Rise and Fall of the Information Gray Industry
Chen Bo looked at the dense countdown of the class, and couldn't help but scratch his ears and cheeks.
"Why do you owe me so much debt, the environment shapes people, you have been here for so long, and you have not grown at all."
Scolding and scolding, but the class that should be made up can't be left behind, he didn't even bother to go to the canteen, so he directly ordered takeout and planned to nest in front of the computer and take the exam endlessly.
"I am the teacher of this class, Chen Zhiqing, who used to work in the Toutiao Department as an information security consultant, so let me take you to briefly sort out the knowledge points."
The hairline has demonstrated the kingship of the teacher, and Chen Bo is still not used to the electronic notebook that comes with the system, and he is still looking forward to it with a pen and paper.
"First of all, we need to understand why personal information has value and how it forms an industrial chain."
Teacher Chen Zhiqing's class is not allowed to fast forward, Chen Bo is quite speechless about this, looking at the progress bar that has not moved, he is worried that tonight will be a sleepless night.
"As individual laborers, if we want to obtain excess profits in social production, there are roughly the following three ways, the most typical is to improve production efficiency and increase output per unit time."
Unlike Mr. Chen's slow and logical speaking speed, his body language is very rich, and watching him wave his arms, it seems that he has left his mouth far behind.
"A typical example is a factory with a pay-per-piece fee, where skilled workers can make 20 more products a day than new recruits because they have mastered the process operation, and your income depends on your production efficiency."
"But in many areas, the benefits of your work output cannot be quantified, a human resources supervisor, it seems that she has nothing to do all day, but she can always recruit a lot of technical experts for the company, a coder who graduated from a famous university, and is busy until one or two o'clock at night every day, in fact, she is repeating inefficient simple bug fixing work."
"In response to this situation, we can roughly divide it into two types, one is to form a comparative advantage in some aspects through technical barriers, and the other is the scope that we will focus on today."
"Creating benefits through information asymmetry."
"Yo, I'm reviewing." Wang Xu carried a string of fried chicken buckets, and when he returned to his seat, he accidentally glanced at Chen Bo's computer.
"Yes, it's all romantic debts, but fortunately, it's not that difficult." Chen Bo pressed the pause button and turned around to talk to Wang Xu.
Wang Xu encouraged: "That's it, the make-up exam, everyone understands the reason, it's really difficult for you, it's not good for everyone, and people don't miss your make-up exam fee." ”
"Then why do we delay graduation so much?" Chen Bo changed his words.
Wang Xu hurriedly changed his words and said: "People won't embarrass us in this kind of extended course, it doesn't mean that they won't let us go in professional courses." ”
"I continued to do the question, and the takeaway called me."
"Oh, so you called this fried chicken, I almost ate it." Wang Xu picked up the fried chicken bucket and handed it back to Chen Bo regretfully.
"Good fellow, I didn't say you still want to be alone?" After Chen Bo finished teasing, he reached out and took out a piece of chicken wings and dangled it in front of Wang Xu.
"I thought it was garbage at the door."
"You forgot to bring garbage to the dormitory." Chen Bohaha laughed, this guy is shameless when he talks nonsense.
Wang Xu snatched the chicken wings, put them in his mouth and chirped: "Don't bother you, go to the auction at night." ”
"Big business again?"
"No, in-game."
Chen Bo continued to watch the video with a fried chicken bucket, for the era in which he lived, personal information leakage was everywhere, whenever he signed up for a qualification exam, there would be a bunch of training institutions calling the door, registering an account with a mobile phone number on the APP, and the text messages would be filled with spam ads immediately.
When I first submitted my resume to Maple Leaf Group, I even received a call from a self-proclaimed bull, who claimed that his practical experience was not enough to enter a listed company, and offered to help him beautify the packaging, but he couldn't even say the most basic code knowledge, which made Chen Bo in front of the phone angry and laughing.
"There are three main ways to leak personal information - poor custody of personal information, internal leakage of information storage companies, and illegal theft by external hackers, of which the latter two are the majority."
"The information leaked by individual citizens due to poor storage is limited and fragmented, and when I used to use QQ, I often received emails disguised as Trojan horse programs, telling me that my graduation photos were taken and asked me to check, but the account was stolen as soon as I entered it."
"There is also a method of pretending to be a bank or public security to send fraudulent text messages, this method pursues winning by quantity, the success rate is low, it takes a long time, it requires manual intervention in multiple links, the risk of exposure is high, and it is gradually eliminated in the development of the information gray industry chain."
"The latter two situations I plan to package and put together, from the perspective of information users, what value can a single information be difficult to generate, a QQ number is lost, the thief can't even know the real-name situation of the mobile phone bound to the QQ number, the same is true for mobile phones, I don't know the online payment password, and the loss caused by information leakage is extremely limited."
"In the context of the Internet, the information has the value of using a person's household registration, usual shopping preferences, office location and home address, and even accurate to the air tickets, high-speed rail tickets, and hotel check-in and check-out times for each business trip."
"With all the information in hand, the portrayal of portraits by artificial intelligence has reached a state of mastery, and it will always push what you want at the right time, knowing yourself better than yourself."
"Today's technology has developed to the point where you can simulate the mood of the moment based on the fluctuation of your heart rate, and put it in the big picture to predict the probability of being scolded by your boss and scolding the table in ten minutes."
"Talking about a terrible thing, this probability is 1 percentage point higher than the success rate of weather forecasting, isn't it amazing, but it is not surprising, the operation law of economy and society is the same, and the innovation point of science and technology is always focused on areas with more development potential in the future."
Chen Bo glanced at the maple leaf bracelet in his hand, and he didn't expect this object to have such a purpose, and he suddenly felt a sense of vigilance that was being monitored at all times.
Teacher Chen Zhiqing continued: "People's information is divided into three, six, nine, etc., and the most valuable part is undoubtedly linked to money, your mortgage, car loan, income, and the price on the gray market is about 20-50 yuan a piece. ”
"As for what brand of milk powder you drank as a baby, soiling your bed a few times a day, fighting a few times at school, and having a crush on a few girls, with all due respect, no one will pay attention even if you print it out and stick it on the street."
"Large companies still attach great importance to the protection of user information, which may be different from your intuitive impression, and you feel that the evil forces led by large companies should be in line with your inner imagination."
"In fact, the income from selling information is insignificant for large companies, and it is the best policy in the industry competition to make reasonable use of this and form information barriers, and most of the information leakage incidents reported in the market are related to the company's ghosts."
"The reason for this is that loose supervision and excessive inquiry rights are the reasons for the enduring gray industry chain, the grassroots personnel of the three major operators can easily obtain the personal information of the mobile phone number owner, and the police stations in remote areas can also browse anyone's household registration information at will through the network system."
"In the face of huge interests, we can't expect everyone to be high-spirited, if we want to fundamentally solve the problem, the key is to start with the system, first of all, the sentencing for information leakage will be increased, the scope of application will be wider, and the cost of violating the law and committing crimes will be increased."
"In addition, the government took the lead in setting up an information protection database, which is the predecessor of personal electronic files, and I have been worried like most people, if the information database is unfortunately lost, it is equivalent to swimming naked on the beach per capita in this era, but then I think about it, since the government can build a complete banking and tax system, why can't it build a good personal information file?"
"Today, although the news of information leaks is common, there are very few gang-type crimes, and as a person who has experienced that era, I feel very gratified, okay, today's class is here first."