The news that Jingdong data is suspected to be leaked, personal privacy data is urgent




Source: 21st Century Business Herald Author: He Xiaoqing


"Black production was rampant at the end of the year. On the one hand, the company has been improving the security of risk control systems and data technology, and on the other hand, it has also launched an anti-black alliance with the industry to share some of the identified blacklists. "On December 13, a Jingdong insider responded to an interview with a 21st Century Business Herald reporter.
Beginning in the early morning of December 11, the news of the suspected leakage of Jingdong data has attracted widespread attention in the market.
JD.com's official emergency response stated that the data originated from a security breach in Struts2 in 2013, when almost all domestic Internet companies and a large number of banks and government agencies were affected, resulting in a large amount of data leakage. At the same time, it is admitted that there are still a very small number of users who have not upgraded their account security in time, and there are still certain risks.
This incident has brought black production transactions to the forefront again. Especially at the current node, consumer credit is developing rapidly, and the price of personal consumption big data is also rising.
"The history of black production has a long history, and personal consumption big data is part of the personal information category. With the rise of consumer credit, personal consumption big data can be used in many application scenarios, and it has also been hyped by black production in recent years. "On December 13, Wei Qianyu, CEO of Shenzhen Xiaoyuren Technology Co., Ltd., revealed in an interview.
Exposure of the black production trading path
"To put it badly, black production trading is actually similar to the dupin trading market seen in the movie. First, there is a large group of people responsible for the production of 'dupin', and then someone is responsible for information collection, including buyer information and sellers. information." Wei Qianyu revealed.
According to the feedback from industry insiders, there is also an unwritten rule in the industry, that is, you can never contact real buyers and real sellers. the imagination of many people.
On the same day, a person from an anti-fraud big data technology company told the 21st Century Business Herald reporter that the specific path of black production transactions is that the most upstream obtains user information, such as account passwords, User identity information, bank card information, etc. In addition, the obtained data will be further refined and screened through some methods of credential stuffing and library washing, and then integrated through layers of transactions. Finally, the downstream uses information to carry out illegal profit-making activities, such as the implementation of telecom zhapian, stealing game equipment, stealing card transactions, etc.
"Of course, there are also many auxiliary tool industries for black production automation, such as code receiving platforms, coding platforms, etc." said the aforementioned person.
A person from a large credit reporting company also admitted that at present, due to the many links in the acquisition, storage and utilization of personal information, offline and online communication is concealed and complicated, the cost of tracing the source is very high, it is difficult to find, investigate and deal with, and punish it. , the compensation is small, and the profit space is huge. The current law enforcement provides a huge speculation space for the black industry chain.
"In fact, personal information trafficking has become an underground industry chain, from illegal collection of personal information at the source, hacking, to illegal sale, purchase, resale, and then to illegal use, all aspects of personal information acquisition, storage, and use are all involved. There may be cases of illegal infringement," the person said.
Up to now, most of the common illegal acquisition methods are acquisition and purchase through the Internet, including phone numbers, call records, transaction orders, positioning information, ID card household registration information, home addresses, etc.
"The phenomenon of malicious collection of citizens' personal information has always existed. For example, when installing certain apps, it will prompt you whether to agree to use your location and whether to send you a message. This is only what we have seen on the surface." Wei Qianyu said. "Actually, as long as you install this app, your mobile phone number, name, address, email, bank account, social account, uploaded pictures, private photos, etc., will only be stored in a database after collection. If the database is attacked or breached by hackers, the information in it will be exposed.”
Personal credit reporting is facing excessive collection
It is worth mentioning that in recent years, with the sustained and rapid development of my country's economy, driven by the development of housing credit, auto credit and credit card business, my country's consumer credit has achieved rapid growth. In the past five years, pure consumer credit has grown to 5 trillion yuan, an increase of more than 800 times compared with a decade ago. The rise of consumer credit has prompted credit institutions to have a huge demand for personal information screening.
In the process of using credit information data, it may involve multiple links such as information collectors, providers (including collectors), organizers, storers, inquirers, and users.
On December 13, Guo Yuhang, co-founder and CEO of Dianrong.com, said that based on AI (artificial intelligence) big data, a large amount of personal privacy data needs to be collected, and there is a high possibility of excessive collection, including GPS information of where you go to work every day, GPS information of where you go home, whether you work overtime, whether you are late, etc.
According to the industrial and commercial registration information database, there are about 2,000 companies related to "credit reporting services" in the market, of which only about 100 corporate credit reporting agencies have completed the filing, and only 8 individual credit reporting agencies have been approved by the People's Bank of China. That is to say, currently qualified credit reporting agencies account for less than 5% of the entire credit reporting market.
"A group of unlicensed, unconstrained or even illegal institutions and individuals are buying and selling people's information to make huge profits, which has caused the vicious consequence of 'bad money drives out good money' for regular credit reporting agencies." In this regard, the aforementioned large credit reporting agencies people said. "It can be said that the existing regulations control formal institutions, while the 'wild children' are unruly."
On December 13, a reporter from the 21st Century Business Herald learned from Sesame Credit that Sesame Credit clearly stated, "Do not collect User chat, Weibo, WeChat, community-related speech data, and do not purchase any form of black data.” Hu Tao, general manager of Sesame Credit, said, "The misuse of users' personal information will cause serious damage to users, institutions and society."
Fu Weigang, executive director of the Shanghai Institute of Finance and Law, believes that a feasible measure is to change the way in civil litigation. The burden of proof is changed from the current "who claims who will provide evidence" to "the burden of proof is reversed". As long as the plaintiff provides the fact that the defendant has contacted him, he can file a civil lawsuit on the grounds that the defendant illegally obtained identity information.
   Zhiwei Technology was established in 2014 and is headquartered in Beijing. It was co-founded by UFIDA Finance, CreditEase and Sunco China executives and financial professionals. It currently has 60 employees. Zhiwei Technology is committed to Internet financial enterprise services, mainly engaged in the development and service of financial enterprise operation management software. The P2P online loan platform, property crowdfunding platform, wealth management system, and loan management system provided by the company have been successfully applied to hundreds of companies and tens of thousands of end users. The main customers of Zhiwei Technology include Yixin, Guanqun, Zhongzhou Weiye, Puda, Zhongsheng Assets, Anxin Excellence, Weilian Wealth, Jiaye, Tongxin Finance, Zhongrong Guohua and other nearly 100 enterprises.
  With the government's increasing supervision of Internet finance, the Internet finance industry is facing unprecedented development opportunities. Internet technologies represented by cloud computing and big data technologies are changing the future of financial services. Technology is the primary tool and driver that supports the prosperity and development of financial markets.
  The integration of technology and finance enables enterprises to form a healthy competition form in the process of participating in competition. Zhiwei Technology has always been compliant in operation and technological innovation, and it has also demonstrated the appearance of a responsible enterprise. Technological innovation refers to the foundation of Dimension Technology's life. Through this advantage, Dimension Technology will continue to do a good job in financial services and use its own strength to reshape the favorable image of Internet finance.
  Smtcloud Technology Headquarters Address: 6th Floor, Building A, Huateng Century Headquarters Park, Chaoyang District, Beijing
  Website: www.smtcloud.com
  Tel: 010–53688599


 

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326826509&siteId=291194637