The secret of the white hat: the Internet is 100 billion yuan in black, scares Musk

Author:New entropy Time:2022.07.25

@新 新 新

Author 丨 Salad sauce

Edit 丨 Yi Page

Unexpectedly, Musk and Twitter would "break up" because of the "junk account".

On July 19, Beijing time, the Twitter Musk's first hearing was held, and the U.S. Tellawa Judge announced that he would judge the Twitter case in October to terminate the acquisition of Twitter.

Earlier, Musk resolutely issued conditions to privatize Twitter at a price of $ 44 billion. However, in the process of the acquisition case in full swing, Musk suddenly announced the suspension of acquisition because there were too many "junk accounts" on Twitter.

As early as May, Musk said that Twitter's "junk account" accounted for more than 19%, and he may re -examine the acquisition for this reason.

Some analysts believe that the so -called "garbage account" is only Musk's excuse. "Personally, I think Musk feels too expensive after the price is on the price, so he uses 'junk account' to talk about funds. Finally, I found that Qian couldn't talk to simply 'swinging'." Said Xiao Yang, a domestic analyst who paid attention to the incident for a long time.

However, some relevant persons believe that Musk really cares about the authenticity of the Twitter account.

Overseas investor Colin said, "I don't think the entire process of Musk's acquisition of Twitter is controlling the stock price or controlling public opinion. Musk often releases news about Tesla companies or products in Twitter. The response. I think Musk originally wanted to turn Twitter into a huge market research traffic entrance. Therefore, the authenticity of the account can directly affect the result, and it is also something that Musk really cares about. "

The reason for Twitter by Musk's "get off the bus halfway" may be controversial whether it is a "spam account". But there is no doubt that these "garbage accounts", or the "water army" in Chinese context, harm the entire virtual and even real world.

The "white hat" swallow engaged in Internet security said that after the rapid development of the mobile smart device and APP industry in 2014, the "Water Army" industry also began to prevail. By this year, the "screen", "swipe", "false account", "false clicks" and other related black production developed based on false accounts, and the market size has exceeded 100 billion yuan.

01 "False" brigade

The data security company of Swallow is established around 2014, and it is also the era when domestic mobile Internet has developed rapidly. With the popularization of smart devices, various mobile phone manufacturers have begun to establish their own software malls, and the way of software promotion has begun to become a variety of.

The most classic is the recommendations of the mobile phone software mall and the information flow advertisement within the major apps.

"There are several universal settlement methods during the promotion, such as CPM (settlement according to the number of display), CPA (settlement according to user actions), or CPC (settled by clicks). Tao, "The user action here is stipulated by the advertisers. Some apps only need to download and click on, while others need to complete the first registration."

Therefore, the means of cheating in response to promotional needs have begun to appear.

"The cheating behaviors of all false accounts can be summarized into two types -the reuse of real equipment and false device simulation user behavior." Swallow said.

Repeated use of real devices refers to changing the authentication logo of the same device through restarting, flashing and other behaviors, and repeatedly click on the same advertisement download channel to fake the illusion of different devices to click to download.

"The equipment certification logo here can understand the human ID card." Swallow said that the mobile device is marked and recognized in the Internet world by identification through the logo of the device, just like humans pass ID card certification in the real world Same.

The identification of some mobile phones can be changed by simply restart, so this also gives the "brush order" black production opportunity.

The other is simulated using virtual machines, generating mobile phone information, and imitating user behavior to click, download and even complete registration.

"Of course, there are also dedicated to use real -life equipment for counterfeiting. We are called 'task walls' in our line. The channels will find some part -time college students or older people who want to earn to make a lot of old people. Let them click to download a software and complete the registration. A registered to a few yuan to tens of yuan. "Swallow admitted.

However, the fake cost of real equipment is much higher than the flashing and virtual machine mentioned earlier, so it is not the most common cheating method.

Generally, these false accounts have "achieved great achievements" after completing the registration task. Therefore, in the future, no one will operate an account activity at all. For a long time, "lying" in the APP will also become commonly known as the "zombie" or "water army".

As the types of APP are more and more complex, the use of the "water army" of the Internet is also full of use.

Brush gifts to the anchor on the live app, control the blogger review of the entertainment app, the wool of the e -commerce app, and even forge the orders for travel apps ... These "navy" are simply "omnipotent."

"Say a recent operation that has made me open." Swallow shared the company's fake means of fake means of traveling APP virtual orders that the company found last year.

Some drivers on some travel apps will receive a long -term order, such as from Beijing Chaoyang to Yizhuang, and may have a high customer unit price in the past, but if you run back, you have to run the empty order without an order. The time of oil and traffic jam could not make much. Last year, the customers of the Yanzi Company reported to them that a black production was discovered to simulate virtual orders. Because some newer travel apps are set to settle order fees to the driver by the platform to encourage driver registration. After the user settle it to the platform, the platform will charge this fee, so the black production has caught this vulnerability.

Black production is sent to the driver virtual order virtual orders. After the driver receives the order, the platform will subsidize the cost to the driver first, and the driver runs back from the city center from far away to end the virtual order. However, the order is false, and there will be no real users to settlement at all, and the platform will eventually become "unjust."

"Including a certain product voucher sold at a very low price on some second -hand platforms. Some of them also come from virtual machines to simulate real users to obtain substituted vouchers in batches." Swallow added, "However, only part of it, not all."

02 The "abuse" of APP and "Water Army"

"I still remember the first big client I talked about. After the test, they had more than 90%of false users. He almost rejected our products immediately." Said Xiaoyu, a programmer engaged in the anti -cheating of mobile devices.

The relationship between the APP and these "waters" is sometimes like a "abuse". I know you are harmful to me, but you can't help "need".

Internet entrepreneurship has long passed the capital boom that can be funded with PPT and stories, and even there are sounds such as "the Internet no longer needs new apps". Therefore, in recent years, if the APP project is favored by capital, it needs more solid user data and monetization methods.

Fangfang said that when the anti -cheating plan sales, when he was selling on the phone, the person in charge of the other party who had just survived the 10,000 -year -old APP directly told her that the user's data has not been "brushed". It is useful to talk about the authenticity of the user. Then hang up the phone directly.

This kind of project or enterprise that is fuzzy for users' authenticity is not only urgently needed data to prove its first creation APP, but also some mature, large -scale platforms.

"One of our old customers is an entertainment social app. They only anti -cheating solutions for our users who open overseas business. Domestic business is not open." Swallow said.

There are two reasons for this situation. First, large APPs are more stringent on their user data sharing permissions. Second, there will be its own security department within large APPs. Purchasing external security solutions will "offend" themselves. In addition, the interpersonal relationship between large Internet companies is more complicated and the chain is longer, so the promotion effect is slower.

"It's like a client made a 'oolong incident." Fangfang said, "We and a community APP data security department has cooperated for more than a year. But I don't know what the company has cooperated with us. "

And even if there is a strong app for users, there will be a lot of detours on the road of cheating.

"Some apps have the" anti -cheating 'consciousness, so they will ask some deeper data to increase the difficulty of cheating false accounts. For example, the seven -day retention rate, three -day login, etc. "Swallow explained that" must be necessary It can only be settled after the conditions are met. "

However, although the demand for mandatory deep data increases the difficulty of cheating, it also affects the authenticity of the data.

"I have encountered a case. The operational interaction of a startup app is not designed to be smoothly uninstalled by the rapidly uninstalled user or user. With more than 80%of the three -day continuous landing rate, they briefly blinded the developers' eyes, and they did not see the problem from the data. "Swallow recalled.

"Truth" is something that these "waters" do not have, but the lack of "authenticity" has a deep impact on an app, but it is difficult to quantify it. The remedy is still the reason for the "spring breeze and the breeze". Unless you encounter a stubble that is pursuing authenticity, such as Musk.

03 Write at the end

Can the Internet say goodbye to the "Water Army"?

In fact, as early as September last year, there was a policy of rectifying the Internet "Water Army".

Surging News September 18, 2021 reported that the State Cyber ​​Information Office recently issued the "Opinions on Further Compacting the Main Liability of the Information Content Management of the Website Platform". Opinions, strengthen account registration management, strictly implement the relevant requirements of real identity information registration; increase the disposal of illegal and illegal accounts, and prevent the reincarnation of illegal and illegal accounts; comprehensively clean up the "zombie" and "empty shell number".

However, the Internet's "clear" "white hat" also requires the joint efforts of "white hats" and APP multi -party subjects.

Data security three -party platforms use blacklist, sensitive behavior testing and other technologies to strengthen the recognition of the "Water Army", the APP owner's anti -cheating awareness of false accounts, the gradual stricter registration mechanism, and the real -name certification mechanism. The army was "combined with a combination of combination."

(The characters in the text are all pseudonyms)

Reference materials:

The "Musk's acquisition case is scheduled to be tried in October, and the" junk account "is key to offensive and defensive?》 Chainke World "Comprehensive Clean up the" Zombie "and" Case "!The State is shot "Surging News

- END -

Happy report!Watching Suzhou's "Syllabus" won the "Science Popularization of the Year" award!

[See Suzhou Specialty Picture/Editing Team]

State Administration of Radio, Film and Television: Basic shutdown of the TV Channel of the TV station by 2025

Today (June 21), the website of the State Administration of Radio, Film and Television issued a opinion on further accelerating the development of high -definition ultra -high -definition TVs, which p