Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 352 Who is peeking at me?

Ye Fei took out another document and said: "Our risk control team has just tested the Apple and Android versions of 50 apps, but the results were unexpected."

"Covering the most popular e-commerce, social, video, music, finance, life, travel and other fields on the market, the results show that only nine apps do not trigger the reminder to copy the clipboard."

"WeChat, Gome, Amazon, Zhihu, Tonghuashun, Meituan Takeout, Dingdong Maicai, Ctrip and Didi Chuxing."

"Of course our app needs no more!"

Chen Feng took a deep breath, took the report and studied it carefully, even Taobao, JD, Suning, Meituan?

"Even when you copy and paste this action in any iPhone app and open the other 41 apps, you may be read as soon as possible, but you don't know."

Ye Fei said: "Copy an associated information at one time in the memo provided by iPhone, including sensitive information such as name, phone number, home address and ID number, and complete the paste in the memo."

"When you open these 50 apps separately, you will still have a security prompt of "Copy Memo for XXX app". After multiple tests, it was found that the results are the same as the above tests, which means that 82% of apps will read the clipboard."

"Because for apps, clipboards are a good tool. For example, after Taobao and Douyin links are turned away by WeChat, they use passwords, QR codes and other forms to achieve jumps."

"Douyin and Taobao will first identify it. If you have their own special logo, you will upload relevant videos or products to match on the cloud, and return the results to the user."

Ye Fei knew that the boss was not from a technical background after all, and explained: "I think secondary pasting is the biggest risk, and the biggest potential risk of the clipboard is not the first copy and paste, because most of the content in daily life is to provide information to the app for the convenience of users."

"The real risk is that after the user copied the content and pasted it into the A application, the copy content was not recycled. When opening the B application, the content can still be obtained, resulting in a continuous leakage risk of sensitive information."

“You can keep it up to twenty times!”

Chen Feng was frightened, but fortunately he didn't have the habit of writing a diary, otherwise...

Ye Fei took a sip of tea and continued: "Apple is better, but Android is even worse. There were apps that were visited more than 20 times in a row in two minutes!"

"This is also the biggest reason why domestic Internet companies are always criticized by foreign countries. To put it bluntly..."

"I'm used to it!"

Chen Feng nodded, he didn't understand the technology very well, but from a legal perspective, whether there is any actual infringement depends on whether the app will upload and retain user personal information after reading the clipboard?

Ye Fei said: "The clipboard of Apple system has always been considered to be more secure than Android. Because when you copy a new content on iPhone, it will directly overwrite the previously copied content."

"And Android phones keep more content on the clipboard, so you can often view the clipboard history in places such as input."

"Of course, Android has also begun to pay attention to privacy protection in the past two years. Many launches are cleared every few seconds, but the path is one foot taller than the demon is one foot taller than the demon."

"The purpose of Apple's update is not only to remind users, who are following me, but also to warn developers not to play too much."

"In general, apps cannot be used to make trouble and cannot perform any operations that have adverse effects on other applications, operating systems, and users, unless you have functional requirements."

"For example, if you don't open GPS, you won't be able to use Baidu Maps or Didi Taxi; if you don't open voice input, you won't be able to use WeChat, phone, etc..."

"If an app wants to obtain more data, it must apply for permissions to other applications, operating systems, and users. Only after obtaining permission can they obtain their data, functional support, etc."

Ye Fei explained: "If you don't give permission, these apps will lie on strike, saying that you won't let me walk through the back door and you won't let you get in the car. When you see, there is no way, so you have to give him all the required permissions."

"One question is often overlooked, that is, the reason why the app applies for permissions to you is reasonable?"

In the next half an hour, the experts let Chen Feng understand what shamelessness means!

If an e-commerce platform wants to know your location information and you reject it, it doesn’t matter. You will always open your location permissions to a social platform or a travel platform, right?

After these platforms have obtained your location permission, they start to act. Quickly call your backend data, advertising platform data, third-party data platform data, etc., and analyze it to find that your behavior trend at this time is: Have you had enough fun, and you have to go back to your unit to work?

Find out some products that 90% will be used immediately: air tickets, sober soup, and fume oil essence, but many merchants want to sell these products to you, what should I do?

The bidding system stood up and started the auction - see if you see, this person will soon see this advertising space in the next second. If you give the price higher, I will let someone's product appear in front of him. After a 0.01-second competition, the big and big airline won, so you will see an advertisement about air ticket promotions.

Who reaped the benefits of the fisherman in the whole process?

Of course it is an e-commerce platform!

All platforms have exposed your location in the data mart. Although it will not be exposed directly, after multiple data flows, an e-commerce platform will immediately locate your location information based on your device number, memory information, etc. based on your device number, memory information, etc.

According to Ye Fei's words, this trick is not even considered a hidden rule!

It’s okay for big factories, after all, they still need some face. If information flows into a database that specializes in the black and gray industry people to reserve personal information, they are called social worker databases in the jargon...

In minutes, you can deeply understand what big data is!

What cooperation model, charging model and employment share...

Data will be applied in precise marketing, online fraud and other aspects...

Conservatively estimated that the number of employees exceeded 1.5 million, and the market size reached 100 billion!

Billions of account passwords are controlled by the black and gray industry, and the industrial chain derived from account theft makes an annual profit of 10 billion yuan.

"Hey, there is no way. If the app does not mine user data, it will be difficult to obtain user pain points and preferences. Without insight into user pain points and preferences, it will not be able to provide appropriate products and solutions, and it will not be able to create commercial value."

Ye Fei said helplessly: "As for advertising, an important source of income in the Internet industry, after the app collects your information, it is not just you who are precisely marketing, but people who have networks with you. People of the same type as you will have a wider range of radiation and become more and more accurate. How can you give up the huge benefits behind it easily?"
Chapter completed!
Prev Index    Favorite Next