Various methods of protecting network privacy in the era of "streaking"

        With the popularization and development of information technology, personal privacy and data security issues are increasingly threatened. In the era of "streaking", how should we effectively deal with cyber attacks, data leaks and privacy violations, and what practical skills and tools can help us. Welcome everyone to discuss the methods and strategies of protecting online privacy.

I. Introduction

        In the Internet age, we can almost be said to be "streaking". Although our front-end interface as a user actually looks calm, in fact, various software in the mobile phone are using various means and methods that we do not understand to crazily steal us. All kinds of private information.

        If you think I'm exaggerating, you might as well take a look at the state's announcement of penalties on a taxi-hailing platform some time ago. There is a very shocking item in it, which is the illegal collection of nearly 12 million pieces of user album information. As far as users are concerned, any software is definitely not allowed to obtain their own photo album information, but this well-known taxi-hailing software can steal the user's photo album information as its own. This also reflects a problem from the side, that is, we think that all big-brand software has these problems, which means that many unknown software will behave more viciously and frequently.

2. Challenges of network security and privacy protection

 

        Faced with this kind of behavior, as a user, the editor is also very helpless, but there is no solution. After all, you cannot do without the support of these software for daily entertainment, takeaway, office work, and travel. Uninstalling is the best way, but it is not necessary. Reality, so we can only find a way to coexist with them. Next, I will organize a few methods for you to make your private information exposed as little as possible.

3. Methods and Strategies for Protecting Internet Privacy

Tips: Discuss the prevention and response measures of cyber attacks and data leakage; tips and tools for privacy protection; share useful experiences and cases, etc.

Do not use WIFI networks in non-home areas

        At present, using home WIFI is relatively safe, because only the operator can get your Internet data, and if you use public WIFI or even office WIFI, then the WIFI provider can get value if they use a little trick It does not wait for your personal information, so the best way is to use the network that comes with the mobile phone card throughout the process.

Important privacy should not be stored on the phone

        Here, the definition of important information is different for each person. For the vast majority of people, the most directly related to privacy may be some relatively exposed videos and photos, or account passwords in clear text. It is recommended not to store such information on your mobile phone. , because most software has many ways to upload this information, and once it is leaked out, it will be too late to regret.

Mobile phones and mobile phone systems should not be too old

        Too old mobile phones and mobile phone systems means that there will be more vulnerabilities, and more vulnerabilities mean that the mobile phone is more likely to be attacked by software! For example, 315 exposed the low-end children's smart watch using the early Android system. The engineer can easily hack into the watch through an induced scan code to realize remote control of the watch's functions.

Turn off personalized recommendations, personalized ads and user experience improvement programs for various software

        These personalized recommended content and user experience improvement plans, once you check, from a legal point of view, it means that you agree to the collection of some of your information by the APP or the mobile phone itself.

        The so-called personalized recommendation is simply big data. For example, if you use your mobile phone to search for iPhone 13 keywords on a search engine, you may capture the search records through personalized recommendations, and then feed them back to major shopping apps. The shopping app will receive push notifications about the purchase of related stores and products on the iPhone 13.

        Although I said close, in fact, this is not clean. Almost every day, our information is leaked to these shopping websites in different ways, and then get personalized pushes to increase the probability of transactions.

Turn off microphone permissions and camera permissions that are not used by software

        Microphone permissions and camera permissions can be called automatically if you enable them, then the software can open your microphone and camera at will without your consent, and record or collect images for you. This risk is the first is privacy leakage, and the second is That is, the microphone can obtain more information through voice-to-text conversion, so as to use this information to know your preferences and what you want to buy in the near future. Of course, these are the most basic.

Do not give permanent permissions to software permissions, key projects need to be prompted every time

If the key permission is given to the software with permanent permission, it means that it can be called at will, and every time the prompt is turned on, it can be guaranteed that every time the software calls the permission, the user's consent needs to be obtained, don't be afraid of trouble!

        For example, many APPs now collect the location information of mobile phone users. If you give permission, they will automatically call the phone while you are not paying attention. If you don’t give it, it will not be able to call GPS and obtain it.

It is best to turn off wifi and mobile network before going to bed

        This method is more ruthless. If you turn off WIFI and mobile network when not in use, you can prevent some apps from secretly uploading your personal information when you are not paying attention.

4. Conclusion

        Many viruses and Trojan horse programs will let you click to download through a link + attractive copywriting. Usually, after you download and install, these software can easily obtain your various information because they have not been reviewed.

Do not download uncertified third-party software on your mobile phone!

Do not download uncertified third-party software on your mobile phone! !

Do not download uncertified third-party software on your mobile phone! ! !

Say important things three times!

        Moreover, some small third-party software does not even have a simple review of the most basic app store, so there is no guarantee in terms of privacy and security, and it may even bring direct harm to users such as monetary loss and mobile phone damage.

Guess you like

Origin blog.csdn.net/leyang0910/article/details/130673861