Internet security spying on you?

  • Big data uses monitoring to call your camera, the apps you opened recently, the content you entered recently, the things you bought online recently, your specific location, the things you searched for recently, the things you always like to watch recently, which are particularly popular recently Things, even the content of your chats and conversations with others, call monitoring and other means.

  • We will recommend things according to the preferences of customers, so it will be better and better if it conforms to the user experience!

  • Another big problem is the exposure of user privacy issues. Not only mobile phone applications, but even operators and mobile phone manufacturers, they know you better than yourself!

  • When you download an app or activate a new phone, there will be a disclaimer. When you agree, you admit that they can monitor all your actions, so network security should be based on everyone's responsibility.

  • Of course, he can monitor your behavior, but in a safe online environment, you don't have to worry about it. But there are loopholes in the network data, or use necessary means (web crawlers, etc.) to extract the content he wants, as small as your recent chat content on WeChat, as large as a region’s purchasing power, income, reasonable expenditure, and loans etc.

  • Why does the secure login keyboard pop up every time you log in to a website? Because of the input method you use, it will monitor every word you enter! Including your login username and password for various websites, etc., big data will even crawl out your password.

  • In a safe network environment (we can call it safe monitoring), your privacy is protected by law, and the extracted content will be used for market research. Using big data can make a product more in line with consumer needs, and corporate The key to success is inseparable from big data! Some apps tweet you based on what's been trending recently on the web. Yes! These contents are all selective, and some things that you do not want to see will be limited or even deleted.

  • For example, Baidu Maps, when you give it the location permission, it will locate frequently in a certain period of time. These applications with high-precision positioning can guess what you do in a day, such as going to a large shopping mall. Hotels with high ratings in his app, or restaurants with interests. You will not doubt that he will monitor your mobile phone, but you will only feel that this app knows you better. When you order food or spend successfully in his app, if the restaurant score is high, he will guide you into the app store. Rate it and you're hooked. Often five-star praise, this is how to use surveillance (AI tracking) to see how Baidu Maps monitors an area? The simplest shorthand is the heat map, which will locate the range of activities of people who install the app in this area. The more frequent the activities, the darker the color of an area, which is your display. In fact, all the detailed pictures of your activities are in their hands, and you cannot see them.

  • Regarding privacy leaks, your data becomes a marketing reference for other companies. These methods are not considered privacy leaks. His monitoring will only make you uncomfortable (in fact, there is no privacy at all when you enter the Internet) and your data will only be used. To call and count (legal), you will never know what is leaked without warning. Then they will always be uploaded to the "net" by criminals, so the "net" is not a "net" in a broad sense, although this network also belongs to the Internet. But very few people can enter, that is the "dark" web, which can be described as "lawless" here, and an ordinary person leaks something that is likely to be sold to a "fraud group". However, important materials and documents leaked by a company or a government (intranet) will be used by spies, and even rise to political security, causing irreparable losses to national security.

  • Once there was a huge data loophole in NetEase, and more than a thousand user names and passwords were leaked on the dark web. What should we do when we know? In fact, there is no good way, that is, to change the password. The company fixes the vulnerability and the user changes the password. Then find out the people involved in the leak and deal with it. In fact, it is not a cure for the symptoms. In an open network environment, it is like an invisible door, and each other abides by the terms!

  • Again, in a safe network environment (we can call it safe surveillance) your privacy is protected by law, but it only exists in an objective "safe network environment"!

How to Get Started Learning Cyber ​​Security

Zero-based entry

For students who have never been exposed to network security, we have prepared a detailed learning and growth roadmap for you. It can be said that it is the most scientific and systematic learning route, and it is no problem for everyone to follow this general direction.

At the same time, there are supporting videos for each section corresponding to the growth route:

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Video supporting materials & domestic and foreign network security books, documents & tools

Of course, in addition to the supporting videos, various documents, books, materials & tools have also been sorted out for you, and they have been classified for you.
insert image description here

Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

 

Guess you like

Origin blog.csdn.net/Python_0011/article/details/130762472