Joke Collection Website - Public benefit messages - A woman in Wuhan received dozens of packages inexplicably without placing an order. How was her information leaked?

A woman in Wuhan received dozens of packages inexplicably without placing an order. How was her information leaked?

A woman in Wuhan clearly did not place an order, but she received dozens of packages inexplicably. All packages were large items and contained the same kind of cushion products. In such a situation, it may be that you have met a store owner to give your store credibility. There are many people on the Internet who have experienced the same thing as this woman. Some people received mineral water, some received empty packages, and some received small gifts.

Today with the development of the Internet, as long as we have access to the Internet, strictly speaking, there is no privacy at all. There are many channels for personal information to be leaked, including software registration, viruses on computers and mobile phones, express delivery orders, takeout delivery addresses, etc.

In my personal opinion, there are the following two channels for common information leakage in life. 1. Mailing address for online shopping

We are on the Internet and fully enjoy the convenience that online shopping brings to us. Sitting in front of the computer at home, or lying on the bed with your mobile phone, you can shop comfortably and wait for the express delivery to your door. This wonderful experience is changing the shopping habits of most people.

As everyone knows, when we shop, we also increase the risk of personal information leakage. If we want the express delivery to reach our home smoothly, we must fill in the address accurately. In such a situation, it also provides a "perfect" channel for address leakage. 2. Registration of various accounts

We who use smartphones will download various applications on our phones. Each application will have a corresponding account. According to the requirements of relevant departments, if the account is to be used normally, real-name verification is required.

It is during the account registration and real-name verification process that the software operator obtained our personal information. In addition, many software require authorization during use. During these two processes, our personal information, along with the data on our mobile phones, may be leaked.

It is difficult to completely prevent information leakage. But we can keep our personal identity documents, destroy the express delivery receipts, and do not throw them away at will. Use this method to protect the security of our personal information.