Joke Collection Website - Blessing messages - How does APP steal user information? How to prevent it?

How does APP steal user information? How to prevent it?

The phenomenon that mobile apps steal privacy or excessively collect user information is not a new problem. Under the background that smart phones have become a necessity for people's work and life, people's deep dependence on smart phones determines that smart phones have become people's belongings.

Take your mobile phone with you when you go to work for a meeting, and put it at the bedside when you travel at home or even when you are resting. Then, once some apps ignore users' rights and interests and snoop and collect users' privacy at will, consumers will become "streakers" who peek at privacy at will without privacy and security.

So, how does APP get our information?

Generally, any App must be installed in the mobile phone. After opening the App, there will be a series of pop-ups asking the user whether to allow some authorization, including address book permission, SMS permission, location permission and call permission.

If you don't agree with these permissions, the App will automatically quit, which means telling the user-don't use it if you don't agree. In desperation, many people can only agree to authorize and then use the App.

But it also opens a back door for these companies to steal privacy.

In addition to obtaining permissions, there are more subtle ways to collect personal information, such as embedding SDK (software development kit). SDK can realize the functions of map, payment, statistics, advertising and so on with high efficiency and low cost, so it is widely used in APP.

However, security risks are also obvious, such as uneven technical level of developers, which may lead to SDK security vulnerabilities; Some developers deliberately reserve a "back door" to collect user information or conduct unauthorized operations. It should be noted that due to the universality of SDK, many apps are embedded with the same SDK. In this case, if an SDK steals private data, users can't find the problem even if they find it.

The subtle way of data leakage is the input method we use every day. Voice input method can collect your voiceprint, and then you can identify yourself by voice, and even unlock your voiceprint lock; The text input method can know your information content; Geolocation can track and record your trajectory; The bookkeeping App can know your financial information; Social applications can know your personal connections and relationships. ......

In addition to individuals, there are many applications used by companies and other institutions, such as Zoom for conferences and nails for enterprise management ... through which you can get information from companies and other institutions!

How to protect personal privacy in the face of various mobile apps?

Download App through formal channels

The installation of the App must be downloaded through the formal application market to prevent downloading to the cottage app. Before downloading the App, carefully check the name, introduction, download volume and evaluation of the App. Carefully authorize unfamiliar and unpopular applications.

Restrict applications from obtaining location permissions

When you just download an App, you will often receive many authorization requests, such as opening a location, accessing an album, using a camera, getting contacts, and opening notifications. Many people click OK without looking carefully, which makes it easy to expose personal information.

Submit information carefully when registering and logging in.

Some apps will collect users' information when they register or log in for the first time, such as some recruitment apps and rental apps, which may involve users' names, home addresses, contact information and even bank cards. Once these personally identifiable information is authorized, it is easy to be targeted.

It is recommended not to use personal real information (such as name, home address, etc.). ) to register and log in. If you need to fill in personal real information, be sure to confirm the authenticity of the App. At the same time, if you need to provide third-party login methods (WeChat, Weibo, etc.). ), try to log in with less personal information.

Cancel accounts that don't use the application.

For unused apps, many people choose to uninstall directly to free up the memory space of their mobile phones, but they may also receive related text messages and phone harassment afterwards.

It is recommended that you unbind personal information (such as bank cards). Uninstall the app that is not commonly used before, and then cancel your account according to the process.