Chapter 45 Into Heaven or Hell? (5)
South Korea's second largest mobile operator, KT Corporation, admitted that the personal information of 870 million mobile phone users of the company was stolen by computer "hackers". The police arrested two suspects on the same day.In fact, personal information leakage incidents of mobile phone users have occurred frequently. Once leaked, it may cause serious spam SMS harassment, private photo and video leakage, and unnecessary troubles.

How to protect our privacy in the era of big data?
Is Snowden who broke the news about "Prism Gate" a hero in the information age, or an unqualified traitorous agent who betrayed his job duties?He has harmed the national and government interests of the United States, betrayed his obligations as a CIA employee, and violated his confidentiality agreement. In this sense, he may not be a role model worth following. Intelligence personnel and information security personnel, like Snowden, sell their intelligence, and the world is also in chaos.But thinking about it the other way around, why did Snowden betray information?He is not doing it for money. He is doing it from the perspective of the people. He wants to protect human rights. He believes that it is immoral and disrespectful for the US government to monitor the American people, Tsinghua University, and European embassies and consulates. , he believes that he needs to represent the dignity of mankind to expose the United States, so from this perspective, he is another hero.But I saw a statistic, the survey results of the American people show that more than 60% of people support the US government’s PRISM program, especially the communication monitoring of the American people.They believe that only in this way can the American people be protected from the second "9" terrorist attack, so that it is worthwhile to pay for a certain amount of privacy and personal safety, not to mention that the Prism project has been obtained by the United States. Approved by both Houses of Representatives.

Although the government can make full use of information technology to strengthen the monitoring of everyone's thoughts and behaviors, but the ubiquitous revelations of the whole people and the spread of diversified opinions are completely destroying the dominant power obtained by brainwashing the traditional ruling by using information asymmetry, WikiLeaks It is the greatest sign of this era: one person can disintegrate the credibility of the most powerful regime in the world by using information as a weapon. People's beliefs are the cornerstone of all management. Assange is the most grassroots hero in the information age. More deterrent than atomic bombs and aircraft carriers, especially for black power!

So, where is the balance between the limits of personal privacy protection and the risk of terrorist attacks against American citizens, and where is the balance of information asymmetry?Finding this balance point is what we should focus on.If purely from the perspective of privacy protection, any individual's privacy cannot be exploited or monitored, can e-commerce still do it?What else can we do with informatization?Does this cause more harm than value created?Where is the degree, that is a question.

Also, you leaked my privacy, did you get my consent?Even if you got my consent, did you do me any favors?Let me participate in the interest sharing?This is the reason why traditional mobile phone advertisements are dead. Every mobile phone user gets nothing except receiving a bunch of junk ads and being harassed.Operators receive SMS traffic fees, advertisers pass on their own advertising information, advertising companies receive advertising fees, but mobile phone users get nothing, so this model must not continue.What is the new advertising model?Let the mobile phone user accept the advertisement automatically, because he can get the benefit: get the use of the product for free or avoid the corresponding communication fee.

In terms of privacy information services, there are a few important words:

First, how can you tell me the information I want to know in a timely and accurate manner.

Second, the information I don't want to know, please don't bother me without consent.

Third, I don't want others to know the information, how do you protect me so that I will not be leaked information.

Fourth, if I voluntarily share a limited amount of private information and hand it over to you for operation, if you make money and get benefits, how much will you share with me?

Allowing users to take the initiative to choose and share benefits is the foundation of the innovation of commercial security models in the mobile information age.

◎Recommended reading

How does Amazon deal with privacy issues in the era of big data[31]
Mobile phone era: the ultimate liberation of thought and human nature
Technology is people-oriented.Humanization is the fundamental attitude of human beings towards science and technology.Science and technology will always serve the good and happiness of mankind.Deviation from this, any advanced technology and advanced tools will only lead to the destruction and harm of human beings.The highest rule of examining a science and technology is whether it is humane.If it cannot meet the needs of human nature, it is evil.

The mobile phone is the button to liberate the good and evil of human nature at the same time.The most popular 3G applications in Japan and South Korea are: AV pornography, games, and gambling!It accounts for nearly 70% of the newly listed business revenue.

If a bandit robbed with a knife in the era of agricultural civilization, he would still rob with a pistol in the era of industrial civilization.Then in the mobile phone age, what would he do with his mobile phone?Robbery of course!

Because of cars, tens of thousands of people die every year, but no one has ever called for the abolition of cars and a return to riding bicycles and horse-drawn carriages.In the final analysis, the informatization of mobile phones must represent the most advanced productivity and the direction of the future, but in this process, it will inevitably bring corresponding harm.However, this kind of harm is only a problem that will inevitably arise in the process of development. We can only adopt various means to support, upgrade, and coordinate, and seek advantages and avoid disadvantages.The ultimate fate of human beings does not depend on the power of technology. Although it is affected by technology, the power of the soul is the foundation of happiness.

Mobile phone is in hope, mobile phone is heaven!The phone makes you desperate, the phone is hell!
We have experienced the darkness of the Middle Ages when there was only one God for mankind.

When Nietzsche said that God is dead, we ushered in the liberation of thought and humanity.

What will happen to the world when the mobile phone says that every individual is God?

The mobile phone is the first opportunity, but also the murder opportunity!
The emperor wanted to kill the minister, he grabbed the bird and asked: Do you think it will fly away alive, or will it be crushed to death by the widows?Reward for correct answer, death for wrong answer!The minister was eager to improve his wisdom: "All fate, life and death are in your hands!"

Indians catch monkeys, put fruits in the cage, and leave a small hole just for hands to enter.The monkey greedily stretched out his hand to pierce the hole to grab the fruit. When the hunter arrived, the monkey was reluctant to let go of the fruit in his hand. He couldn't break free with his hand, so he was arrested!

How to master it?Can you let go?The mobile phone is the first opportunity, but also the murder opportunity!
2011年7月2日11点30分我用手机写了一首关于手机的诗:
Mobile phone
Covering the sky with one hand and killing all threats

Human-machine integration to open up the spirit

Naked but still want to control

Wit is not given up as a scepter
The sky and the earth are all positioned
steal tracking scheming wireless
your destiny your love

my vitality palm lottery

heart to heart

Exhausted in vain
________________________________________
[1] 《斯里兰卡手机定位救出71游客 35人来自中国香港》,新华网,2004年12月29日。

[2] 《iPhone急救帮大忙 海底地震65小时后获救》,中关村在线,2010年1月22日。

[3] 《中国移动贯通“最后一站”村通工程100%覆盖》,搜狐IT,2011年3月11日。

[4] "Background: The Deputy Governor Buys and Murders His Wife", Caijing, No. 2005, 21.

[5] Yang Fang, Li Qing: ""Military Informant": Mobile Phone Location", "Liberation Army Daily", May 2013, 5.

[6] 《美公布“9·11”袭击当天50多万条当事人手机短信》,《环球时报》,2009年11月26日。

[7] "Woman swallows mobile phone", "Chutian Metropolis Daily", September 2013, 9.

[8] "Marriage Killer Facebook: One in Five Divorce Cases in the United States is Related to It", International Online, December 2010, 12.

[9] Liu Wentao: "Wife cheats on online dating and wants divorce, husband stabs rival to death to save family", Sichuan News Network, August 2013, 8.

[10] 《痴迷微信摇一摇 80后男子一手葬送美满家庭》,大江网,2013年7月18日。

[11] Sher Israel: "Weibo Power", Renmin University of China Press, 2010 edition.

[12] "The Power of Microblog in Wenzhou Train Accident", "Qilu Evening News", July 2011, 7.

[13] "Weibo Becomes the Main First Exposure Media of Internet Rumors", "Changjiang Daily", May 2013, 5.

[14] "SMS spreads rumors that Hong Kong Bank of East Asia was run out", Phoenix.com, September 2008, 9.

[15] Liu Tao: "Sichuan Holds a Press Conference to Clarify Guangyuan Citrus Rumors", China Broadcasting Network, October 2008, 10.

[16] "Qin Huohuo and other network promoters were arrested and posted false news on the Internet many times", "Jinghua Daily", August 2013, 8.

[17] "Beijing Internet Rumor Dispelling Platform Cleans up Tens of Thousands of Rumors Every Day", People's Daily, August 2013, 8.

[18] "The children and grandchildren are all playing with mobile phones at the family dinner", the old man throws the plate and leaves the table in anger, "Xi'an Evening News", October 2012, 10.

[19] The author is unknown: "Mobile Phone Crime", reposted from Weibo jokes.

[20] "Survey Says Many Chinese Start and End the Day with Mobile Phones", China News Network, July 2013, 7.

[21] Zhang Yixuan, Yue Yafeng: "Internet Search Changes the Gap between Grassroots Elites, Everyone Can Know All-In-One", "People's Daily Overseas Edition", July 2009, 7.

[22] "Over 2013% of Parents in Dilemma Reflect Children's Obsession with Pad", Sohu IT, February 2, 25.

[23] Chen Sai: "We Are Entering Another Age of Darkness and Ignorance", "Sanlian Life Weekly", September 2009, 9.

[24] 胡彦珣:《微信打飞机制造商机淘宝1元可帮刷分》,新民网,2013年8月7日。

[25] "Private Enterprises Call for Protection of Virtual Wealth Experts Say Legislative Conditions are Ripe", "China Business Times", March 2004, 3.

[26] Paratrooper Swimming: "Network Virtual Wealth Protection: Social Recognition and Legal Support", Bitnet, February 2004, 2.

[27] "A worker answering a mobile phone in Brazil caused a gas station explosion", "Beijing Evening News", November 2007, 11.

[28] "Why do you have to turn off your mobile phone on the plane?" ", Sohu IT, June 2013, 6.

[29] "Legislations in various countries to protect online privacy: US law and self-regulation go hand in hand", "Chinese Journal of Science", December 2012, 12.

[30] Zhang Chuanzhi: "Top Ten Mobile Phone Privacy Leakage Incidents", Paopao.com, December 2012, 12.

[31] Shirota Makoto: "The Impact of Big Data", People's Posts and Telecommunications Press, 2013 edition.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like