Joke Collection Website - Public benefit messages - How to control the "willful" App in the mobile phone to prevent the disclosure of personal information?
How to control the "willful" App in the mobile phone to prevent the disclosure of personal information?
At the same time, your personal information is also obtained by it in minutes. In daily life, we often get a lot of personal information, such as accurate positioning, address book, sending text messages and so on. , no user's choice. This over-collected personal information is likely to be leaked, which will eventually infringe on consumers' personal privacy.
According to the investigation report of data leakage in 20021year, it is found that 6 1% of data leakage is related to voucher data. When users' personal information is leaked, there will be security risks such as sales calls, SMS harassment, fraudulent calls, junk information, etc., and the situation of personal information protection is grim.
So, do you know the channels through which mobile apps get people's information? What are the reasons for the disclosure of personal information? Do App developers or operators need to take responsibility? How to standardize the behavior of App to collect personal information? Today, we invite experts in the field of Bangbang security to share with you in detail.
How mobile phone applications "erode" personal privacy information
Calling the mobile phone App from the mobile phone address book to read the contact permissions has become the hardest hit area for privacy violations. The reason is closely related to the marketing strategy of application developers to promote platform socialization and build an acquaintance community.
Look at the text messages. App's permission to read SMS is usually used to automatically extract the user's SMS verification code, which helps users improve the efficiency of App SMS verification operation. However, in short message reading, the reading authority of App has not been effectively supervised or restricted, and some illegal APPs may use this authority to steal users' short messages, which seriously threatens the security of users' private information.
Get location information. Judging from the functions of mobile apps, maps, travel, online shopping and social apps all have positioning functions. Obtaining user location information is conducive to providing more accurate services, which is a reasonable appeal. However, some mobile video, audio, information reading and tool-based mobile applications can still access and abuse location information.
Experts share the consequences of information disclosure
"It may lead to more serious problems, such as spam messages, harassing phone calls and fraudulent use of personal identity. At the same time, the disclosure of personal information is the key factor for the successful implementation of fraud. Under the premise of accurately grasping the user's personal information, criminals can fabricate more confusing fraud scenarios and then defraud the public. "
Reasons for Personal Information Leakage of Mobile App
0 1 Personal privacy protection awareness is weak.
Most collection users did not carefully read or never read the privacy clause when installing the collection App, which to some extent reflects that most mobile phone users have a weak awareness of personal privacy protection, and even think that minor problems do not matter. When they tasted the consequences of privacy disclosure, they did not have a strong sense of active rights protection. Most people choose to admit that they are unlucky, which objectively condones the increasingly serious information leakage of mobile apps and forms a vicious circle.
Application developers lack self-discipline and sense of responsibility.
03 application distribution platform supervision is not in place
As an important part of the regulatory ecology, the application distribution platform plays a "gatekeeper" role in the mobile application security system. Some application distribution platforms do not strictly require the detection of apps that need to be put on the shelves, resulting in non-compliant apps being put on the application distribution platform.
Supervision and intervention in APP special rectification
Continue to purify the APP ecology.
Users cannot become "transparent people" in the era of digital intelligence.
With the in-depth development of the "Internet" action, the application of smart phones will be everywhere in our lives in the future, and its security issues should not be underestimated. In addition to the promotion of supervision, security experts believe that enterprises, third parties, and participating users need to work together in many ways to purify the App ecosystem and enhance personal safety information awareness.
0 1 individual user level
Improve the awareness of personal privacy protection, be vigilant when sharing and using personal privacy information, download the App from formal channels, carefully click on the download link of the App with unknown sources, carefully read the application authority and user agreement or privacy policy description of the app, and understand the precautions in operation. Do not open and agree with unnecessary privacy authority at will, and do not enter personal privacy information at will. When personal information is found to be leaked, we should take the initiative to defend our rights through effective means, report to relevant departments when necessary, and use legal weapons to safeguard our rights and interests.
02 application developer level
First of all, application developers must establish the awareness of the first person responsible for users' rights protection, stick to the safety bottom line and strengthen the responsibility of protecting users' personal information; Secondly, we should obtain user data in a reasonable and legal way, take effective measures to ensure the safety of users' personal information and data, and win users' choice and trust with service quality and security guarantee; Thirdly, when providing relevant services and fulfilling the obligation to inform, consumers should be prevented from misunderstanding and misreading in a concise, eye-catching and easy-to-understand way; Finally, enterprises should fully listen to and respect users' reasonable demands and opinions and give timely feedback to improve users' satisfaction and trust.
03 application distribution platform level
As the first hurdle for App to enter the market, the application distribution platform should do a good job in auditing and screening. At present, the mainstream application stores in China have basically established a shelf review mechanism to conduct all-round inspection of application security, application content, in-app advertising, user privacy and other aspects, and then put the application on the shelf after testing compliance.
"Security" contributes to mobile application compliance.
"Secure Mobile Application Compliance Platform" collects and analyzes application compliance, dynamic behavior, software components and security vulnerabilities by means of deeply customized detection sandbox, automatic shelling, automatic application detection and manual in-depth auxiliary testing, and can rely on professional technical service personnel to output comprehensive and detailed compliance detection reports, provide rectification suggestions, and help users meet the detection scenarios such as compliance supervision detection and enterprise self-inspection.
- Related articles
- Blessings to the company
- How long will the meter turn on when there is no electricity, and how much electricity fee will be stopped?
- Let me ask you, what does that ghost expression my best friend sent me mean?
- What is a mobile phone mailbox?
- Why do you see pictures in the gallery when you read text messages?
- There is no essential difference between a monthly salary of over 10,000 and a monthly salary of 3,000. How much salary can I save in a month?
- What's the difference between brand-specific and ordinary delivery?
- The bank of Chongqing Rural Commercial Bank inquired how many short messages to send.
- The blind date is neither too hot nor too cold. I deleted her WeChat twice, but she still added me. What does she mean?
- A poem about missing your lover in the snow (a poem describing missing your lover in the snow)