From data leakage to big data, where is the future of the Internet?

640?wx_fmt=gif&wxfrom=5&wx_lazy=1

Introduction: Since the birth of the Internet, the boundaries between the virtual world and the real world have become more and more blurred, and we have become accustomed to working, studying, socializing and other behaviors in life in the online world. Due to the characteristics of the Internet, we can put aside the shackles of reality and live a second life on the Internet. The basis of all this is that everyone's information is well protected. However, the recent leak of private data and Big data also makes people understand that the network is not a peaceful place.


640?wx_fmt=jpeg&wxfrom=5&wx_lazy=1


When we log in to some websites that need to be registered, during the registration process, we have already handed over our information to the background of the website intentionally or unintentionally, and users also instinctively believe that the website will not easily leak their information, but this This trust mechanism is obviously extremely fragile.



01 The most common incident in the network: data breach


The unrealistic environment in the Internet is one of the important reasons for the development of the Internet. In addition to making the common people feel convenient, it also allows some people with bad intentions to take advantage of it. Online privacy data leakage is one of them, and it is also the most common accident on the Internet today. Of course, some data leakage is just an accident.


640?wx_fmt=jpeg


But in any case, the leakage of private data will not only threaten the security of an ordinary user's online account, but also directly affect all aspects of his real life. The recent public uproar of Facebook user data leakage has put users around the world in danger, and many well-known people have announced their withdrawal from Facebook, threatening to protect their privacy and data security.


Speaking of the specific hazards of privacy data leakage, we can probably list the following points. One is that it may lead to the exposure of user financial accounts such as Alipay, WeChat payment, online banking and other account numbers and passwords, which will be used by others to commit financial crimes. The second is that the virtual assets in the user’s virtual account may be stolen and realized; the third is that the leakage of private data will lead to a large number of advertisements, spam information, e-commerce marketing, etc. being sent to users, bringing extreme benefits to users’ lives. Big inconvenience.


Of course, the above are just a few simple examples, and the harm of privacy data leakage is of course more than that. And because there is still no effective means to prevent such incidents from happening on the Internet, data leakage occurs from time to time.



02 Most data breaches originate from within


In 2017, it was the year with the most rampant data breaches. According to a recent report "2017 Poor International Security Practices Take a Toll" by Gemalto, the amount of data stolen in the first half of 2017 exceeded the total amount of data stolen in the whole of 2016.


640?wx_fmt=jpeg


Between January and June 2017, an average of 10.5 million records were stolen every day. Although many data breaches are caused by external hacker attacks, only 13% of the records are stolen or lost; in contrast, internal malicious leaks, negligent and unintentional leaks by employees, etc. account for 1.9 billion stolen data. 86% of .


These data also show that, in terms of privacy leakage, compared with hacker attacks, the proportion of data theft caused by internal leakage is greater. This is also an unavoidable problem that lacks effective supervision at present, but it has to be paid attention to.


The collection of data itself is beneficial to both enterprises and users, which can help enterprises to better serve users. If there is no data breach, this also seems to be the perfect solution, and users can get better service by submitting their own data. But the reality is obviously not so simple, and maybe users get a worse experience.



03 "Killing" the big data of user classification


Some time ago, Didi was exposed to kill users with big data, and there was a lot of public opinion. Obviously not everyone likes the feeling of being treated differently, especially in the case of a price increase. Although Didi quickly clarified it, the method of big data killing has been known to the world.


640?wx_fmt=jpeg


So what is big data killing? Generally speaking, this kind of behavior refers to judging users' consumption potential through big data. When users are judged to be high consumers, users will be treated differently, and their consumption prices will be increased. Other users spend more money to enjoy the same goods and services.


Killing on the Internet is nothing new, it has been around since the birth of the Internet. In 2000, there was also a remarkable killing incident. Some Amazon users reported that after they removed browser cookies, the price of previously viewed DVD items dropped from $26.24 to $22.74.


此消息一出,备受舆论压力的亚马逊只能出来解释,称这项功能只是向不同顾客展示的差别定价实验,绝对与客户数据没有关系。最后也只能努力公关,才度过了这个信任危机。如今的一些互联网公司,显然已经忘记了亚马逊当年的遭遇,试图重蹈覆辙。



04 强迫用户开放权限的应用们


当然,由于技术的不断完善,大数据杀熟甚至可以让用户毫无察觉。以电商平台为例,系统可以根据用户的历史消费、浏览记录、筛选条件等数据了解其偏好和预算,然后为其展示专门的搜索结果。


640?wx_fmt=jpeg


尤其在中国特殊的环境之下,由于网络监管还未完善,因此互联网企业可以很轻易就能获取用户的日常网络操作流程,为其进行画像。除此之外,为了获取更多的数据,很多手机APP也设置了繁多的权限,需要用户同意才能使用,比如地图APP需要用户开放读写存储以及浏览联系人的权限,若不同意,则无法使用。


这样强迫用户开放自己的隐私数据,上传给相关企业,而通过数据分析,这些应用甚至会比用户自己还了解自身,这样的情况下杀熟更是得心应手。这种抢夺用户的信息,然后加价卖回来的行为,也让用户感到莫名的愤怒,但是却又无可奈何。



05 区块链能否成为解决这些问题的关键?


对于当下而言,我们要么离开互联网,要么只能被迫对相关企业开放我们的隐私,这似乎成为一个难以解开的死循环。不过区块链的出现倒是给这道问题指明了一个方向。


640?wx_fmt=jpeg


区块链本身也是一个去中心化的分布式数据库,区块链之中,每个用户都能作为单个节点存储数据。并且在数据上传之后,会在区块链所有区块都产生备份,相当于通知了链上的所有区块,让大家都知道发生了什么。


这样就能够极大的避免数据被篡改以及滥用,数据的使用权也将属于上传者所有。密码学算法保障每个人只能查看自己的数据,发送自带数字签名,拿到私钥才能解密数据。这样就能够保证用户对于自身数据的完全拥有权,避免了数据泄露以及被杀熟的可能。


目前市面上的区块链技术依然还远未到成熟之时,但是其发展前景已经被所有人都看中,改变数据存储的方式,将会是互联网的下一个重大变革,这对于用户而言,都将会是一个福音。



小结


There is nothing wrong with technology itself. From the invention of the Internet to the emergence of big data, these technologies have undoubtedly brought us more convenience and made the world more colorful, but technology has no likes and dislikes, but people have their own choices. , When a company chooses to use technology to do evil, it may gain temporary benefits, but lose its own brand.


Whether it is data leakage or big data killing, in the case of data being monopolized, it can be expected that it will still happen inevitably in the future, and only by breaking this data monopoly and letting the rights of data return to the hands of users, can the Real benefits for everyone.


Author: Huang Shanming

Source: OFweek IoT (ID: ofweekiot)


Recommended reading


The Japanese grandpa insisted on painting with Excel for 17 years. I may have used a fake Excel...

180-page PPT, explaining artificial intelligence technology and industrial development

Finally someone explained cloud computing, big data and artificial intelligence!

The data tells you: Compared with the lack of "core", China's current problem is more deadly!



Q:  What are your expectations for the future?

Welcome to leave a message to share with you

Feel good, please share this article with your friends

For reprint/submission, please contact: [email protected]

For more exciting articles, please click "Historical Articles" in the background of the official account to view

640?wx_fmt=jpeg

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325798893&siteId=291194637