In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
In the process of using mobile phones, you will always encounter pop-up prompts that some applications require permissions. In general, the editor directly authorizes all permissions to these applications.
Later, colleagues told the editor that these must not be authorized at will, especially the following three permissions, which will increase the risk of privacy disclosure.
So about the knowledge of authorized application permissions, the editor will share it with you!
1. Access to cameras and microphones
I don't know if you still have the impression of the "secret app photo incident" a few years ago, that is, the user allowed the camera permission of an app, and then when the user used the mobile app, the camera automatically rose and then retracted.
Therefore, in order to avoid the recurrence of such incidents, people must carefully consider when authorizing [camera] or [microphone] permissions to prevent themselves from being secretly recorded or photographed.
two。 Address book permissions
There are more applications that need address book permission, and social APP related to making friends will request to obtain address book permission. However, once some illegal App is allowed to gain access to the address book, there is a risk that their privacy and the personal information of their friends in the address book will be disclosed.
Therefore, it is recommended that when authorizing this permission, we must pay attention to the security of app.
3. Location permission
This kind of access is one of the rights that lawbreakers want most, because from the location information, we can easily infer our company, school, home address and frequent location, and then analyze our occupation, income, living habits and personal privacy.
Is not very terrible, so the general location information, as long as we authorize to map applications, such as some music listening software or games, try not to authorize.
In conclusion, the era we live in is the big data era, in which no one dares to guarantee the absolute security of their private information, but we can only reduce the possibility of privacy disclosure through the only way.
Therefore, for some non-authorization will not affect the normal use of permissions, we do not need to authorize, some applications from unknown sources, we should also be careful to authorize.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.