typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 46: Targeting and Stealing Information

At a time when [leditimab] is about to be launched on a large scale, but has not yet actually been launched.

International pharmaceutical companies have already obtained [ledizumab] through various channels.

Although the number is not much.

But it was not easy and a high price was paid.

Without enough money, many people are unwilling to take huge risks to do this.

After all, [Super Group] is not a vegetarian either.

During this period, many cases of criminal attempts to steal [redimab] have been uncovered and have been brought to justice.

Because of their bad nature, a long prison life awaits them.

Many [intermediaries] who originally wanted to extend their hands were frightened and did not dare to extend their hands.

That is, those brave guys dare to take a gamble!

This is why international pharmaceutical companies, international groups, and foreign institutions obtain [ledizumab] at a high cost.

In fact, it would not be good for [Super Group] to react too quickly.

In recent years, because [Chaoqun Group] has developed too rapidly in [artificial intelligence technology].

In addition, [Super Group] reacts too [quickly] to certain things.

Other people, other organizations, other think tanks are not fools.

They will all see these situations in their eyes.

They will doubt whether [Super Group] has mastered [Strong Artificial Intelligence Technology], like the [Red Queen], [White Queen] or [Brother's Nest] in the movie, and has been secretly monitoring the global network.

of?

This is not unfounded suspicion.

Several smart programs launched by [Chaoqun Group] all have such potential.

Like [Intelligent Butler Xiaolan], if you didn't know it was an artificial intelligence program early on, otherwise, it would mix in the Internet and chat with you as a stranger, and you would not be able to detect anything unusual.

In fact, even if you have known for a long time that it is just a smart program, you will often treat it as an equal person in daily chat conversations.

What if these smart programs were used to collect data and monitor the network?

Who can guard against it?

There are one or more Internet companies around the world, as well as research institutions from various major countries, all of which are studying the [intelligent programs] launched by [Chaoqun Group]!

But after so many years, I still have no clue, and I haven’t even cracked the shell of these [intelligent programs].

Not to mention the source code included!

Experts say that [Chaoqun Group] is one to two levels ahead of the world in [artificial intelligence technology].

Why doesn’t this worry those in power?

[Four-Armed King Kong] has reported to Wu Siyuan many times that since [Chaoqun Group] launched a series of ultra-era smart programs, major countries around the world have strengthened Internet isolation.

For example, some meetings that are not that important are physically isolated and no electronic devices are allowed to be involved. The content of the meeting is not uploaded to the Internet and exists in paper form. After the meeting, there is no discussion on the Internet.

They are all afraid that there is a [ghost] on the Internet monitoring them.

Not only other countries are afraid, but China... is also worried.

Because [Super Group] is becoming increasingly difficult to control.

In recent years, China has been brewing a new bill, which is aimed at Internet companies collecting information without authorization. On the surface, it is aimed at the excessive collection and use of personal information by App-related technology industry entities. In fact, the main target is [Chaoqun Group].

Many people feel this way:

I just told my colleagues that I wanted to eat spicy hotpot for lunch, and when I opened the ordering app, the first two listed on the homepage were actually spicy hotpot merchants. When I was shopping on the weekend, I was discussing with my friends which skirt looked good, and when I opened a shopping app, I found all kinds of dresses. Netizens

Xiaolan just mentioned that she wanted to change the color and configuration of her mobile phone. She clicked to buy on the e-commerce platform, and the system automatically selected the dark purple color and 256GB memory she wanted. Netizen Xiaoli answered a call from Estee Lauder customer service in front of her husband. That night, her husband

Cosmetics ads appeared in the app. After netizen Xiaozi and her friends complained about a certain slipper, the exact same pair of slippers appeared on her app recommendation homepage...

If something like this happens again and again, it will make people wonder whether their mobile phones have been [bugged]!

Do all the apps installed in mobile phones have ears, quietly stealing and eavesdropping on our information all the time?

There are even remarks like "APP knows you better than you".

Although many major Internet companies have publicly responded to this issue, claiming that they will not collect user information without their knowledge.

But in fact, the credibility is not high.

In May 2021, relevant departments tested the collection and use of personal information of some apps that are widely used by the public. The problems found in 105 apps include: collecting and using personal information without user consent; violating the principle of necessity, collecting and using personal information.

Personal information unrelated to the services it provides; undisclosed collection and use regulations, etc.

So how do these apps collect our information?

When some apps are launched for the first time, before the user authorizes and agrees to the privacy policy, they obtain personal information such as the user's application installation list, or apply to open location, phone, storage, recording and other permission issues; when some apps are running, the user explicitly refuses the location, camera

, after applying for microphone permission, frequent pop-ups are still sent to the user to apply for permissions that are not related to the current service scenario.

Apps can obtain user information by calling the phone's microphone and camera permissions, as well as calling the phone's clipboard, address book, location information or stored behavior. This method is generally called "monitoring", and the "monitoring" here is actually

It is not just "listening", but also includes activities such as "watching", "reading" and "passing".

In addition, even if the App does not call the phone's microphone permission, it can still "detect" user needs by analyzing data related to the user, the user's device, and the user's environment. This data includes the name of the downloaded and installed App, and the approximate location of the IP address.

Geographical location, user’s online browsing history, search traces, etc.

In addition, some mobile apps can even use the built-in acceleration sensor of the mobile phone to collect the vibration signal of the sound emitted by the mobile phone speaker without the user's knowledge, thereby "eavesdropping" on the user's voice.

This is because the speaker and acceleration sensor in the mobile phone are installed on the same motherboard and are very close to each other. The vibration generated by the speaker when playing sound can significantly affect the readings of the mobile phone's built-in acceleration sensor. Therefore, by hijacking the mobile phone's built-in acceleration sensor

, and collect its vibration signals, you can identify or even restore the sound signals played by the mobile phone.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next