Joke Collection Website - Public benefit messages - Why should mobile phone software read mobile phone information (contacts, information, call records, etc.)?

Why should mobile phone software read mobile phone information (contacts, information, call records, etc.)?

It is a good design that software needs permission. You can apply for whatever permission you need, unlike the previous one-pot control.

but the system gives such a frame, but developers don't think so, but too many softwares don't use all the permissions. For example, some photo apps need phone permission, address book permission and so on. Do you need it?

it's necessary for developers. They hold all the permissions first, and what to do once they use them later. Some apps even refuse to run without notifying users, and hooliganism is extreme.

The fruit shop is very strict about this. If the permission is turned off, it will not pass the review and be put on the shelves. The Google Store has started a stricter review in the past two years, so many common apps are no longer visible in the Google Store because they can't pass the review. Android is allowed to install the app without going through the store. Many developers will "find another way" and put a "clean version" on the shelves. After two days of installation, you will be asked to "upgrade". After upgrading, you will find that there is no added function, but it is not smooth to use and there are more advertisements.

So many apps that need a lot of permissions just reserve a lot of permissions for themselves for future use. As for user privacy, developers don't care.

At present, many mobile phone applications need to read personal privacy information such as contacts, information, call records, etc. Except a few social applications need to use some personal information, in fact, most applications don't need to read personal information of users' mobile phones at all. Many applications want to read personal mobile phone information of users, mainly by collecting, using or selling personal information of users to achieve the purpose of illegal profit. It not only seriously infringes on the user's personal privacy, but also easily causes the user's financial loss, so try not to install applications that do not need to use personal information and illegally read personal mobile phone information.

In fact, the APP of major Internet companies generally has the problem of illegally obtaining personal mobile phone information, and uses this information for commercial purposes, which is euphemistically called "big data", while "big data killing" is achieved by illegally collecting personal information and analyzing it. Because these Internet companies are in a monopoly position, users are helpless to collect information illegally by the application of such enterprises, so the protection of personal information of mobile phones requires not only the self-discipline of relevant enterprises, but also the construction.

why do you need so many permissions when installing Android phone software? Some softwares do need relevant permissions. For example, it is normal for sports software to need GPS permissions. For example, it is understandable for social software to get microphone permissions, but what permissions do you need for a video APP to make calls? Some game software simply asks for all permissions. What if you don't allow it? You just quit and can't use it. If you want to use this software, you must authorize it. This is a bit of a bully clause and hooliganism ...

In fact, it is almost transparent to use personal privacy after these softwares excessively coerce users to obtain permissions. For example, if you search for something on the shopping APP, then the advertisements you see on other webpages are similar products. A big brother said that personal privacy will become transparent in the era of big data. If you do good things with your personal big data, forget it, but can you do bad things if you get the user's data by criminals? At present, the disadvantages of privacy transparency still outweigh the advantages!

It should be said that consumers need to decide whether to give or not their permissions, not that you will not be allowed to use this software without permission. Even in the era of big data, users should be given a choice. What if someone doesn't need big data? In fact, all this is the reason for the lack of supervision. Previously, Android rogue software was maliciously deducted and started at will. These phenomena are much better now, but as we rely more and more on mobile phones, personal information and preferences are all on one mobile phone. A mobile phone contains too much information. And the protection of personal information security also needs to be accompanied by development ...

Before the launch of VIVO NEX, it was a disciplinary committee, because some software always obtained camera permissions intentionally or unintentionally, and NEX was electrically lifted, which well exposed the true face of these rogue softwares, but these softwares quickly made modifications, but it is not uncommon for software vendors to call permissions at will, and some softwares said that asking for these permissions would not gain users' privacy.

when we download the APP, some software will take away some of our mobile phone information, as well as the picture function and so on. If this is its necessary function, then we can actually release this permission.

However, in many irregular softwares, he deliberately collects your information and sells it to others, so this has caused very serious consequences. If the contacts, information and some pictures in your mobile phone are collected and used as some bad things, then you must suffer immeasurable losses.

So when we want to download software, we'd better download the regular software. In addition, there are some apps, which have this monitoring function and can know which permissions you have opened and which situations you have restricted. In fact, we can well see which software is particularly malicious and rogue, and we will resolutely delete it.

another problem is the lack of management, because the software APP is developed by companies or individuals, and sometimes the permissions in it are written by programmers' code, so you can't supervise it at all, so you can only know whether the software is good or bad through others' reporting afterwards.

Even those regular apps, it is possible for him to collect your information, because he can collect information and do an AI analysis, so he can know what you want to do more accurately and accurately. For example, if you search for something today, it will be pushed to you all over the place tomorrow, so it is really terrible to say this.

At present, there are basically hooligans in mobile apps, and they collect data that has nothing to do with them. Some apps can't be used normally if you don't agree, so it's not convenient to use them, so you have to agree. It is suggested that the Ministry of Industry and Information Technology strengthen supervision, so that at least users can use the APP normally after actively disagreeing with the relevant data collected by the APP.

firstly, those mobile phone softwares all want to obtain the private information of individual users so as to operate some profitable projects.

second, the system setting of the mobile phone itself is beneficial for all kinds of software to obtain information such as individual users' call records and contacts.

Third, although the mobile phone software can obtain your personal privacy information, there are prompts now, which you can set to prevent the program from obtaining.

when installing, you can set it on your mobile phone, and you can change all the prohibitions if you don't need to open it, or you need to ask. Basically does not affect the use of functions. Many apps don't work normally because one item is disabled. For example, WeChat, if you don't use it to find people nearby, the geographic location information can disable it. All permissions are not open.

Nowadays, we use mobile phones more and more, and the functions that are constantly updated and developed attract more attention to meet our social, entertainment, games and other needs.

Although these softwares enrich our lives, they also bring some negative aspects, because in the era of Internet, the exchange of information makes us more sensitive to each other's privacy.

But nowadays, the software that makes us rely too much reads our personal information, which makes many people feel a sense of insecurity.

The permission request pop-up window that pops up when installing a software really bothers us, but don't rush to allow it.

you should first determine whether it is within the acceptable range. for example, if you install a map software, it will require you to open the geographical location permission and use the "positioning function or access to GPS". However, if you don't open it, you can also enter the software. The big deal is that you can't get the current location and navigate. You can view the route after manually entering the location.

However, some rogue software will require that you must open the geographical location, allow the deletion of call records, read short messages, etc. If you don't allow it, the software will not be able to use it all the time.

you should be careful with this software at this time, so why does the mobile APP software read our contacts, address book and so on?

The first reason: software permission requirement

It is inevitable that after some software is installed, you must have this permission to use that function to ensure the normal operation of the software, such as mobile phone backup software and so on.

Because you need to access your contact information, you can meet the backup requirements. As for reading the contacts of WeChat, you can recommend friends to add them manually through the address book. Many people will not resent such permission application, even if you choose not to open it, it will not have any impact on the use of WeChat.

the second reason: collecting user information

now is the era when data is king. In a sense, user information is money, which can be promoted because many apps can put advertisements and get profits from advertisements.

As long as developers collect your personal information, they can make targeted delivery and make recommendations according to your preferences and concerns. As long as you are interested in clicking on advertisements, APP developers will receive corresponding benefits.

The third reason: loan risk control needs

In fact, many apps are related to risk control, such as cash loans. In order to protect themselves from reading your address book so that they can contact you or your family and friends when necessary, we can see that users who fail to repay on time or not will be bombarded by telephone.

The third reason: real-name registration system's requirements

With the real-name registration system requirements of the Ministry of Industry and Information Technology for fixed lines and mobile phones, the current mobile phone number has achieved a comprehensive real-name registration system, unlike the previous temporary mobile phone number that can be bought on the street without a real name.

it doesn't work now, so some apps can realize the real-name authentication process by binding the user's mobile phone number, which is more convenient for users.

In today's Internet age, ordinary users are streaking in front of the platform. In order to avoid the disclosure of our information, we suggest that you refuse to APPly for permission to read real-name registration system and information when installing the app.

However, if some APPs can't run normally because they can't read the permissions, we can open the permissions of the address book, be sure to have enough safety awareness, choose a regular app store or official website to download the software, don't use some apps from unknown sources, and try to refuse to get the apps from the address book.

because for most mobile phone software, only by obtaining some necessary mobile phone information can the normal operation of the period function be guaranteed. For example, social software such as WeChat has a function of "viewing friends in the address book", which requires reading contact permissions. Through this function, you can see who among mobile phone contacts is also using WeChat, and it is very convenient to add friends. The software such as Gaode and Baidu Maps must use the location authority, otherwise the map can't determine your location, and you can't navigate.

Similarly, many softwares provide the function of "automatically filling in the verification code", and this function requires permission to read information. Some netizens feel that it is troublesome to fill in the verification code, so they directly provide this permission to the software, which is actually not a good habit.

As for the call record authority, generally only software such as phone book and backup will be used. Other financial software will also force access to contacts and phone records. Once a user borrows money and fails to pay it back, his relatives and friends may be harassed by debt collectors.

In fact, most regular mobile phone softwares don't get mobile phone information at random. For example, the software "mobike" only uses four permissions: camera, location, WLAN and Bluetooth. These are the functions that must be used when you want to enjoy cycling.

as for contacts, information, call records, etc., they are all sensitive permissions. Nowadays, smart phones also pay more attention to security. Once software tries to read these sensitive permissions, the mobile phone system will automatically pop up a prompt. If the user feels inappropriate, it is enough not to provide these sensitive permission functions to the software. As long as it doesn't involve core functions, most software can run normally even if it refuses to provide mobile phone information.

If a piece of software obviously has no social and communication functions, but requires to obtain contacts or call records, it is likely to have another purpose. Nowadays, users' real personal information is very valuable and can even be sold directly by the article. Therefore, some nonstandard software pays attention to personal information, and uses some junk software to get the phone information of users and their relatives and friends. As long as a user installs this kind of software, the numbers of all contacts on his mobile phone will be leaked, which is simply profitable.

Of course, it is definitely illegal to illegally obtain and buy personal information. Conscious mobile phone application software developers should never follow suit!

The information age is inseparable from the Internet. Our mobile phones need to download various apps, including making friends and chatting, traveling and staying, entertainment and leisure.

then why do you need to read the information of mobile phone users? This is based on the authorization of mobile phone users. Any standard APP will prompt: so-and-so needs to extract your location, your address book and your photo album, so it is more reasonable. For example, WeChat account prompts the address book, which is to recommend friends in the address book according to their own needs. If the prompt requires a location, they either need to send it to friends or set their own location when sending a message. If authorization is required for photo album or camera, it may be to select photos from the photo album when sending it to friends or posting a message.

@ Accurate Positioning is a friend around you. If there are any shortcomings, please give us your comments and comments.