Nowadays, how to protect your privacy
has become a problem that many people are concerned about
An image you take casually when you go out
may expose your location
Content mentioned casually in chat
Mobile APP will soon push related
...
When using mobile phone
How is our privacy leaked?
How to protect your privacy as much as possible?
Mobile microphone leaked
Do you have such an experience? Just after talking about something, the phone will push the relevant content to you in a while. In fact, this is most likely the result of the mobile phone microphone permissions being obtained. With the permission to use the microphone, the mobile app may hear the sound of our conversation or even the sounds near the environment in which the mobile phone is located without us knowing it. Then upload and analyze the collected information, and deliver the advertisements to us accurately.
Privacy protection tips
Applications are not granted to various mobile phone permissions unless necessary. Important permissions such as microphone, mobile phone address book, photo album, address, etc. must be granted with caution.
Free WiFi leak
When you are out, many friends like to connect to free WiFi, which also gives criminals an opportunity to take advantage of it. Some criminals place free WiFi in public places. When users connect, they will obtain user privacy information through authentication pages, Trojan programs, etc., thus posing a security risk.
Privacy protection tips
Turn off the WiFi automatic connection function in public places. If you need to use WiFi, try to choose WiFi with a clear source, and do not browse important information, log in to important accounts, make online payments, etc. in a public WiFi environment.
6 phishing website leaked
Criminals spread phishing website links through text messages or web page pop-ups, disguising them as banks, online shopping platforms, winning activity pages and other websites, inducing users to enter personal identity information, mobile phone numbers, bank card account information, etc., and subsequently package personal information and resell it or use personal information to carry out targeted fraud.
Privacy protection tips
Don't click on the website link of unknown source. When entering personal information, you must carefully identify the authenticity of the website.
Mobile input method leaked
Generally speaking, there are many APPs on our mobile phones, but there is only one commonly used input method. If you enter content in the input method, there will often be different APPs to recommend it to you, which may be the reason why the input method shares information. When some input methods are installed, they require the user to use the collected information to provide customized content to users and display personalized content or advertisements in the user agreement, thereby causing personal information to be leaked.
Privacy protection tips
Use the original input method of the mobile phone. If you want to use a third-party input method, you can turn off the intelligent recommendation function and personalized recommendation function of the input method.
Mobile clipboard leaked
Do you often use the copy or cut function when playing with your phone? The mobile phone clipboard is like a transit station. While using this function, it is inevitable to get in touch with some of your privacy information, such as your account password, personal delivery address, chat history, etc. This gives some APPs and third-party software development packages an opportunity to take advantage of, resulting in information leakage.
Privacy protection tips
Open the clipboard function of the input method and regularly delete the sentences cut in the clipboard. Or in the clipboard settings, turn off the clipboard recording function.
Original picture of mobile phone leaked
Many people like to send pictures in high-definition original picture when posting pictures online. But do you know that the original image taken by a mobile phone will carry more information, including the phone model, lens parameters, shooting time, and geographical location information, etc., which may be obtained by others and be used by those who are interested.
Privacy protection tips
When taking photos, we can turn off the positioning of the mobile phone, so that the original image has no address information; when posting pictures online, do not check the option of posting the original image, just send compressed images.
Source: China Telecom