Joke Collection Website - Blessing messages - Is 360 really stealing user privacy?
Is 360 really stealing user privacy?
The so-called "evidence" published by 1 Jinshan is the URL access record uploaded by 360 security guards when users are attacked by malicious web pages. There is no act of collecting users' personal privacy and information that can locate users (such as user ID, computer name, etc.). ) will not be uploaded. Uploading suspicious website information is a common technology of security software, and many security softwares have similar functions. Ironically, after users visit suspicious websites, Kingsoft's own software Kingsoft Netshield will also upload web browsing records. Is it also "collecting user privacy"? Jinshan company has long framed its opponents by fabricating false evidence. The last time was in the micro-spot case, the person in charge of Jinshan Company instructed Li Tiejun, a security expert of Jinshan Company, to stamp the key perjury materials, which led to the imprisonment of Tian Yakui, deputy general manager of Micro-spot Company. This time Jinshan slandered 360, but it used the same technology. Since 360 launched free antivirus, various rumors about 360 from traditional antivirus manufacturers have never stopped. One of its modus operandi is that 360 invades users' privacy. 360 has publicly hosted the product source code to China Information Security Evaluation Center, and released the most detailed white paper on user privacy protection in the industry. Users can monitor and detect at any time, and look back at those companies that denigrate 360. They can't do either. 5. When the webpage protection function of 360 Security Guard Network Shield is turned on or the user uses 360 security browser to visit the website and click the link in the webpage, 360 will send the website to 360 Cloud Security Computing Center for networking security detection. Compared with malicious URL database, the data submitted by computer networking is only URL, which does not contain information that can track and locate users. This is a common cloud security service for any security provider. 6 360 Cloud Security Center has established a database to store tens of millions of malicious URLs on the server side. Through webpage security detection, if you open a Trojan website or a website with a Trojan website link while surfing the Internet, 360 network shield or 360 security browser will intercept the Trojan in the webpage or pop up a warning window in time to prevent Trojan from entering your computer, stealing your data or destroying your computer. Isn't the cloud killing in Jinshan the same?
- Related articles
- Inquire about SMS notification service
- The bank card is bound to the mobile phone. Why is there no SMS reminder of money?
- Summary of drowning prevention education and publicity activities in 2022
- Short message interception software
- Why can't China Mobile Banking receive the verification code?
- What did suzhou economic and trade take in the interview?
- How to deal with traffic violations found online. Thank you. It should be "Illegal Parking Notice". Thank you,
- How to leave the short message on the mobile phone as evidence?
- How to open SMS service
- Online registration process for low-income living allowances in other places