in front of the country, your message you decide? Who can use your information you can choose

?

prism door to remind the world a real truth: in this free and equal sharing of the Internet, there is a place where there is no real privacy. Once a terminal is connected to the network, all the information can be recorded, and all the actions may be tracked and watched. PC Internet so, the mobile Internet is also the case, the future of the Internet TV, it is so. For the extent of privacy disclosure, the latter two leaked more information.

but I think, privacy issues prism door exposure, to me such an ordinary grass root mass, it may not be significant. Because the prism door is through a specific network technology to monitor (this technology is a little threshold, need to be trained to master). But it is well known that we live in a country where no technology can achieve online registration: micro-blog account must use his true identity.

so, privacy prism reveals that there is no meaning? A: No.

If you want to

from the legislative point of view, you will find that in recent years, with the development of Web2.0 has privacy and mobile Internet, almost reached the point of madness. Across the network privacy boundary behavior, we see the news exposure, and through the use of network to collect users’ personal data, has been following the rogue software, has become a new fashion, no cancer. This 3Q war only disclose privacy issues on the PC a corner of iceberg, has attracted a great disturbance, who had been seriously considered, privacy issues in the mobile phone, will be more important than the PC on the

?

according to the Internet Lab exposure, alleged violations of Internet privacy behavior, there are about 7 common performance:

(1) without notice: obtaining, collecting personal information without consent.

(2) cross site tracking: tracking the behavior of Internet users in different sites, so more and more social concern.

(3): hackers do not tell others in obtaining information system.

(4) network monitoring: monitoring user network life.

(5) network exposure: Online leaks, malicious dissemination of personal privacy.

(6): slander slander, false information spread.

(7) violent harassment: E-mail system to send spam.

first sins: do not sue: without consent to track or access to personal information

iPhone did this. In addition to apple, Google also have this habit, but also to pay a serious price: in order to better track the user’s web browsing activities, apple browser exploits Google very cunning, on behalf of.

Leave a Reply

Your email address will not be published. Required fields are marked *