In the era of privacy, the network survival guide written by hackers to you

Author:Zhanlu CHEERS Time:2022.07.29

Regarding some applications of stealing user privacy and data leakage, you may think that people have been angry, but the actual situation seems to be the opposite.

Many people accepted the facts "someone can see us" to some extent, and they believe that privacy does not matter to him. They do not need to hide it. They will say, "After all, I am not a criminal, and I haven't done anything bad. . I don't care if anyone sees what I do online. "

But is this really the case? There are many small clauses that have not been enforced in the law, and you may violate them without knowing it. Now, just click a few times to prove that you are illegal through data marks, and anyone who wants to prove it can do it.

Moreover, as early as the United Nations Declaration of Human Rights in 1948, privacy was identified as a basic human rights.

If our privacy needs to be protected in 1948, of course, it is more needed now. After all, we are the first generation in human history that can be monitored so accurately, and we may live in digital monitoring throughout our lives. Almost all of our exchanges will be seen in this or that way.

Living in a digital monitoring state, the real danger is not in the collection of data (we are almost incomparable to this), but what these data are used after collecting.

The legendary figure of the network security industry, the world's number one hacker Kevin Mitnek, wrote the book "Defending Privacy" after the "Golden Basin washing". At the dangerous edge of the leakage, and the "stealth technology" of the lifetime income was written into this book.

It is a bit unrealistic to protect privacy by relying on our own strength, but this book will let us know how to protect the most important information, so that it will not be damaged by fatal.

Face recognition, the culprit of personal privacy leaks

Web photos can not only expose your position, but also expose personal information about your personal information when combining with certain other software programs.

In 2011, Researcher Alexandro Aquiste, a researcher at the University of Carnegie Mellon, put forward a simple assumption. He said, "I want to see if I can find the corresponding face on the street. That person's social security number. "Then he found that this was indeed possible. By using an ordinary network camera photo of a student volunteer, Aquisi and his team obtained enough information, and this information can be used to obtain personal information about that person.

"Online data and offline data are fusion, and your face is the fusion channel -the real connection between these two worlds." Aquris told Threatpost, "I think this is a very frustrating lesson. Real. The concept of privacy is being eroded, and we have to face this reality. On the street or in the crowd, you have no privacy. All these technologies are matched together to challenge our biological expectations for privacy. "

In order to conduct research, Aquisi and others stopped at the campus of Carnegie Mellon University to stop and fill in a network survey. When each student participates in the investigation, the network camera on the laptop will take a photo of him, and then someone's face recognition software will immediately cross -refer to the picture on the network. At the end of each investigation, a few retrieved photos are displayed on the screen. Aquiste said 42%of photos were correctly identified and linked to the student's Facebook profile.

However, the most horrible experiment is to connect a person's face to his social security number. In order to do this experiment, Aquisi and his team found the birth date of this person and the Facebook file in the city. In 2009, the same group of researchers stated that this information itself was enough to let them find a person's social security number (the social security number was published in order in accordance with the formats of each state. Social security numbers include numbers with birthdays or very close to birthdays, which allows researchers to more easily guess a person's last 4 digits).

After the preliminary calculation, these researchers sent a follow -up survey to the student volunteers at Carnegie Mellon University to ask if the top 5 digits of the social security number predicted by their algorithms are correct. The survey results show that most of them are correct.

Now I dare to bet, and some photos you don't want to send it to the Internet. Otherwise, it is likely that you will not be able to withdraw it out of the network again -even if you can delete them from your social media website, it will not help. In some reason, once you put something on the social network, it is owned by the network and is no longer controlled by you. And you have already agreed on this condition in the service terms.

If you are using Google photos, deleting photos does not necessarily mean that the photo disappears. The user has found that even if the application is deleted from their mobile devices, these pictures still exist. why? Because these images are independent of the application after reaching the cloud, which means that other applications may also access and continue to display the images you deleted.

This kind of thing has realistic consequences. For example, you have published some stupid descriptions of someone's photos, and this person is now working in the company you are applying for. Or you posted a picture of you and someone you don't want your current spouse to know. Although the account may be personal, the data is social network. In the era of social networks, how to protect personal privacy

你 Try to "blur" your personal information

No need to lie, as long as you deliberately given vague facts. For example, when you grew up in Atlanta, you can write or "I am from the south" in "Southeast of the United States". You may also need to create a "safe" birthday (not your real birthday) to further hide personal information.

After creating or adjusting your personal information, take a few minutes to see the privacy options of each website. For example, you should use privacy control on Facebook, including label review; disable "recommending my photos to friends"; disable "friends can mark me elsewhere".

Also remember that no one forced you to publish personal information. You can publish more or less information according to your own ideas. You need to decide your personal privacy level, and you must understand that any information you provide cannot be withdrawn.

社 Be careful of those organizations that monitor social networks

If you release the content that makes some organizations disgust, they sometimes follow you, at least monitor you.

Another privacy issue on the Internet is related to the leak of the tweet, that is, the privacy tweet is public. This kind of thing happens when a friend of a person with a privacy account forwarded or copied or pasted to an open account.

Do not share addresses, phone numbers, credit card numbers and social security numbers on the Internet. If you have to share sensitive information, use the private message function to contact specific individuals. But be careful, even privacy pushes or private messages may be made public.

录 Remember to withdraw from login

If you use a website and use someone else's computer for access, or if you use a public computer to access it, you must always remember to withdraw from login. This is important. You don't want others to click on the return button on the browser to see your information, or even modify your information. Also remember to cancel the checkbox of "Remembering me" on the login page.

▌ Close your position

In terms of geographical positioning, in general, you should check whether any mobile application you use will broadcast your position. In most cases you can close this feature, you can close it in each individual application, or you can close it together.

Before you agree to download any Android applications, you must remember to read its permissions first. If you are not satisfied with these permissions, or do you think that they give the application developers too much control, then don't download this application. Apple does not provide similar application information in its store. Instead, it requires a time prompt to authorize a certain authority during the application of the user. Essence

In the era of big data, "privacy just need" has become a reality. Defending privacy is the skills that everyone deserves to have and need. Read "Defending Privacy" and learn more practical methods to maintain hidden hidden in the digital world.

Li Yanhong once said in a high -level forum, "I think the Chinese are more open. If they are willing to exchange convenience or efficiency with privacy, they are willing to do this in many cases." When did it start, and we are so unwilling for our privacy protection and is accustomed to it?

The book "Defending Privacy" will make you soberly realize how original data such as email, intelligent networking cars, and family Wi-Fi network make us more "fragile". The author Kevin Mitnick will teach you several stealth Dafa. He will also tell you several anonymous skills so that you who have nowhere to be ticked to find some self -confidence.

- END -

Take the "Cultural Stage" for the masses -the first community cultural activity show in Altay area

Reporter Zhang Ting Correspondent Wang ChaoOn June 20, the first community cultura...

The non -heritage "live" "fire" "fire" from the "two innovations" of Wu Lian culture at the time

A few days ago, the organizing committee of Shandong Hand -made · Preferred 100 selection activities publicized the selected unit and nomination unit. The Zhao Laohan Shi Mo from Wulian County wa