In daily life, mobile phones have become our daily essential, because we can use the mobile APP to conduct daily communication, study, work, etc. But we do not know when the big data of major platforms will begin to analyze our daily records, Now travel routes are recorded by navigation apps and monthly expenses are controlled by different payment apps. As mobile app users, we frequently face the overlord items of developers. The software can be used without privacy permissions and cannot be used without privacy permissions. Software, on and off allows users to compromise.
What kind of user privacy information does various mobile phone apps borrow according to the name?
Read the local identification code: Almost all apps like to collect this permission. The reason for this is because the local identification code is equivalent to the local identification number. Once the identification code is determined, it is equivalent to the user. Of course, the bona fide use of this feature is the uniqueness of installed statistical software.
Enabling address book permissions: This involves reading, modifying, deleting contacts, call records, and so on. For example, Google Play, Google Music, Google Maps, etc use this permission. What do they need this permission for? it is all for marketing, and at the same time for you to match mobile friends on the same platform.
There are also apps for reading the installed list, waking up the whole family bucket series, and various personal privacy apps that involve obtaining geographic location information, reading the phone number, turning on the camera, using the microphone to record, turning on the WIFI, turning on the Bluetooth, etc.
Last month, related departments announced the permission of hundreds of commonly used apps to collect and use personal information. We can see that the Android system has permissions that are closely related to the collection and use of personal information.
Recently, the National Technical Committee for Information Security Standardization published on its official website the "Network Security Practice Guide-Essential Information Specifications for Basic Business Functions of Mobile Internet Applications." The "Specifications" clearly defines map navigation, network ride-hailing, instant messaging social networking, and communities. Social media, online payment, news information, online shopping, short videos, express delivery, catering delivery, transportation ticketing, dating, dating, job hunting, financial lending, real estate transactions, car transactions and other essential information related to 16 basic business functions.
For the time being, in addition to the continuous improvement of the law, enterprises should also strengthen self-discipline. Of course, users also need to strengthen self-defense awareness.
So how can individuals effectively prevent the leakage of private information? There are few suggestions are here:
- Actively manage the privacy of mobile phones. When installing the software, some software that involves private information will be shut down completely. If you have installed it, you can enter the setting interface to close the permissions.
- Download the application software from the registered company and google verified license. The relevant soft copies of the registered and verified license have manually been reviewed, at least in terms of security, and it is more reliable. Software that is not downloaded through the authorized and Google verified license can easily collect user information beyond the boundary.
- Improve self-privacy security awareness, and don't easily authorize core privacy data such as password records and fingerprint verification.
- Never share your credit card and debit card information with any un-registered and third-party apps over the phone. It is strictly advised by banks that they will never ask any personal information on the phone.