Your personal information is leaked like this

Author:Jiangsu Police Time:2022.09.18

Your personal information

It was leaked like this

Notice!

Speaking of privacy leakage

Some people will say

But look at your phone

SMS, harassment calls, spam,

Can you still take a chest and pack your chest?

So,

Which behaviors are leaking your privacy?

01

Original mobile phone

Everyone will choose to upload the original picture when you are exposed to the picture

Usually when you take pictures on your mobile phone

Mobile phone will generate photos related parameters synchronously

There are many sensitive information in it

mainly include:

Shooting time, equipment used,

Shooting parameters, image processing parameters,

GDS positioning data, etc.

And upload the original picture

All of these will be uploaded

02

Mobile phone input method

Sometimes you will find out what you just talked with friends

It will soon appear in the shopping recommendation table

This is actually a ghost in the input method!

When some input methods are installed

Will clamp the prompts in the privacy clause

Most people may not look at it carefully

Some input methods are more direct

A pop -up window horizontally there

Do you disagree? The ____ does not work!

that's it

No matter what you say

All of your information are recorded!

03

Mobile phone clipboard

The clipboard is like a courier transit station

Every time you copy the information, you will get here first

Only then will be sent to a new address

In this process

The clipboard is exposed to some of your privacy information

There is often no way to avoid

If it is not cleaned up

When you open other applications

Those applications will peek at your privacy

04

Mobile phone Bluetooth

Is the mobile phone Bluetooth always open?

see this

That is

As long as others and your Bluetooth are on the same network

And your Bluetooth is opened

Not only can he steal your sensitive information

You can also track you

05

Netdisk link leakage

I don't know when you share the network disk

Will there be a password

If not

This link is open

It will be displayed on your app personal homepage

See directly by others

The biggest risk is from the Internet crawler

Many criminal gangs

Use crawlers to capture personal information to make money

There are many online disk search websites

Is crawler technology

Search through keywords

You can find the content of someone else's network disk

I will take a while

You listen to it

1

Fill in personal information carefully online shopping

When applying for shop members and filling in the receipt information, if the necessary real -name system, you can choose a nickname instead. If you choose the courier station, express cabinet, etc., you don't need to accurately reach the specific house number of the address. If a merchant calls for praise, it can be complained on the relevant platform.

2

Be careful when handling personal information

The content of the personal information must be exited, deleted or destroyed in time. For example, the application software on the public computer must be exited in time, and the files should be deleted in time; Paste the courier form to destroy.

3

Carefully authorize when using mobile phone software

When authorized APP -related permissions, you must carefully check the contents of the notification, and you need to turn off for the use of the software. At the same time, account authorization must also be canceled for long -term unused third -party platforms or websites.

4

Pay more attention when using personal information

After using the relevant documents, you should delete the photos in the mobile phone in time, and don't keep it all the time. At the same time, after a copy of the relevant documents, it is best to write in the blank space that "this copy is only for XX use, he uses invalid" to ensure that personal information is not used by others as much as possible.

5

Do not care about publishing information on the open platform

Before publishing the content on the open platform, you must check whether your personal information is exposed. For example, when you are married, you must cover up key content such as your personal name, ID number, etc. At the same time, when interacting with netizens on the platform, do not easily leave personal contact information, family address, etc. When participating in the questionnaire survey of the open platform, do not fill in related content and other related content.

6

Pay attention to taboos when you are exposed to your circle of friends

1. Do not take train tickets, airplane tickets, boarding pass

2. Do not take passports, door keys, license plates

3. Don’t take the position

4. Don't take photos and names of children

5. Don't take photos of the elderly at home

The last point! Intersection

Please see, please,

Please master the mobile phone use tips.

Police tip

1. "People nearby" please close

The function of "nearby people" on WeChat can locate your position. You can click "Settings-General-Discover Page Management-People Nearby" to select "Close the Import of the Discover Page".

2. "Allow search", please close

In WeChat "Privacy", close "Search for Me" and "You Can Search for me via a mobile phone number".

3. "Allow View" please turn off

Turn off "Allow strangers to view ten friends circle" in the WeChat "Privacy" option.

4. Don't panic when you lose your mobile phone

Call the operator (China Telecom 10000, China Mobile 10086, China Unicom 10010) to lose mobile phone number; call the bank to freeze mobile online banking; relieve the Alipay 95188; relieve WeChat 110.qq.com.

These tips to protect personal information

Have you mastered it?

Hurry forward to your dearest person

Planning | Sun Ye Dai Xiaogang Zhang Azheng

- END -

This year's netizens have split the most lies: I have read the agreement

Editor's Guide: The most lied in this life, that is, obviously did not read the no...

PingPong partner Luo Yonglong: Cross -border e -commerce cannot be separated from the digitalization of industrial chains and other industrial chains

Economic Observation Network reporter Tian Jin Cross -border e -commerce has becom...