I collect gold fingers in the heavens

Chapter 814 Targeting and Stealing Information

When [Redikumab] is about to be launched on a large scale, but it has not yet been launched.

International pharmaceutical companies have obtained [Redikumab] through various channels.

Although not many.

But it was not easy, and it cost a lot.

The money is not in place, and many people are unwilling to take huge risks to do this.

After all, [Super Group] is not a vegetarian.

During this period of time, many criminal acts of trying to steal [Redirimumab] have been found out, and they have been transferred to justice.

Because of their bad nature, they will have a long prison life waiting for them.

Many [intermediaries] who originally wanted to reach out were frightened and did not dare to do so.

That is, those few daring guys who dare to take a gamble!
This is what led to international pharmaceutical companies, international groups, and foreign institutions getting [Redikumab] at a high cost.

In fact, it is not good for [Superior Group] to react too quickly.

These years, because [Chaoqun Group] has developed too rapidly in [Artificial Intelligence Technology].

In addition, [Superior Group] reacted too [quickly] on certain things.

No other people, no other organizations, no other think tanks are fools.

Will see these situations in the eyes.

They will doubt whether [Superior Group] has mastered [Strong Artificial Intelligence Technology], just like [Red Queen], [White Queen] or [Brood] in the movie, and has been secretly monitoring the global network of?

This is not groundless suspicion.

Several intelligent programs launched by [Chaoqun Group] all have such potential.

Like [Smart Housekeeper Xiaolan], if you didn’t know it was an artificial intelligence program early on, otherwise, it would be mixed in the network, chatting with you as a stranger, and you would not be able to detect the abnormality at all.

In fact, even if you know that it is just an intelligent program, you will often treat it as an equal person in daily chat conversations.

What if these intelligent programs are used to collect data and monitor the Internet?
Who can guard against it?

There is one Internet company in the world, counting one, and research institutes in various major countries are researching the [smart program] launched by [Chaoqun Group]!
But after so many years, there is still no clue, even the shells of these [smart programs] have not been cracked.

Not to mention the source code in it!

According to experts, [Chaoqun Group] is one or two levels ahead of the world in [artificial intelligence technology].

Why doesn't this worry the major power holders?

[Four-Armed King Kong] has reported to Wu Siyuan many times, since [Chaoqun Group] launched a series of smart programs beyond the era, major countries around the world have strengthened their Internet isolation.

For some less important meetings, physical isolation is adopted, and any electronic equipment is prohibited from intervening in them. The content of the meeting is not on the Internet, but exists in paper form. After the meeting, it will not be discussed on the Internet.

They are all afraid, there is a [ghost] on the Internet monitoring them.

Not only other countries are afraid, but even the country of Hua... is also worried.

Because [Superior Group] is becoming more and more difficult to control.

In recent years, Huaguo has been brewing a new law, which is aimed at the unauthorized collection of information by Internet companies. On the surface, it is aimed at the excessive collection and use of personal information by App-related technology industry entities. In fact, the main target is the [Superior Group].

Many people feel this way:
I just told my colleagues that I want to eat Malatang at noon, and I opened the ordering software, and the top two on the homepage were actually Malatang merchants; when I went shopping on weekends, I was discussing which dresses look good with my friends, and when I opened a shopping software, I found all kinds of dresses. Netizens Xiaolan just mentioned that she wanted to change the color and configuration of her mobile phone. She clicked to buy on the e-commerce platform, and the system automatically selected the dark purple and 256gb memory she wanted. Netizen Xiaoli answered a call from Estee Lauder customer service in front of her husband. Cosmetics advertisements appeared in the app. After netizen Xiaozi and her friends complained about a certain type of slippers, the exact same shoes appeared on her app recommendation homepage...

When things like this happen again and again, people will wonder if their mobile phone has been [wiretapped]!
Do all the APPs installed in the mobile phone have ears, stealing and eavesdropping on our information quietly and all the time.

There are even remarks like "APP understands you better than you".

Although many major Internet companies have publicly responded to this question, claiming that they will not collect user information without the user's knowledge.

But in fact, the credibility is not high.

In May 2021, the relevant departments inspected the collection and use of personal information of some apps that are widely used by the public. The problems discovered by 5 apps included: collecting and using personal information without user consent; violating the principle of necessity, collecting Personal information irrelevant to the services it provides; undisclosed collection and usage regulations, etc.

So how do these apps collect our information?
When some apps are launched for the first time, before the user authorizes and agrees to the privacy policy, they obtain personal information such as the user's app installation list, or apply for permission issues such as opening location, phone, storage, and recording; when some apps are running, the user explicitly refuses location and camera , After the microphone permission application, the user will still frequently pop up the window to apply for permission that has nothing to do with the current service scenario.

The app can obtain user information by calling the mobile phone microphone, camera permissions, and calling the mobile phone clipboard, address book, location information or storage behavior. This method is generally called "monitoring". The "monitoring" here is actually Not just "listening", but also activities such as "seeing", "reading" and "passing".

In addition, even if the app does not call the microphone permission of the mobile phone, it can "detect" the user's needs by analyzing data related to the user, user equipment, and the user's environment. These data include the name of the downloaded and installed app, and the approximate location of the IP address. Geographical location, user's Internet browsing history, search traces, etc.

In addition, some mobile apps can even use the built-in acceleration sensor of the mobile phone to collect the vibration signal of the sound emitted by the mobile phone speaker without the user's knowledge, thereby realizing "eavesdropping" on the user's voice.

This is because the speaker and the acceleration sensor in the mobile phone are installed on the same motherboard, and the distance is very close. When the speaker is playing sound, the vibration generated can obviously affect the reading of the built-in acceleration sensor of the mobile phone.Therefore, by hijacking the built-in acceleration sensor of the mobile phone and collecting its vibration signal, the sound signal played by the mobile phone can be identified or even restored.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like