"Voluntary" privacy leak, find out

When someone asks you about privacy issues, you have the right to remain silent. However, in most cases, when people enjoy the convenience brought by the Internet, people take the initiative to hand over the information. There is a kind of helplessness, pain and happiness.
2345 screenshot 20180407201524
"Voluntary" privacy leak, find out
Privacy issues have always been the focus of discussion. Recently, Li Yanhong’s views on the use of personal information at the China High-Level Development Forum have caused controversy. On the other side of the ocean, Facebook also had a big event due to privacy. 50 million user information was leaked, and the “Delete Facebook” campaign broke out across the network.
Regarding people's attitude towards privacy, whether it is voluntary or passive acceptance has once again become the focus of public discussion.
In this regard, on the one hand, there are voices saying that people's sensitive awareness of privacy protection is weak, and voluntary choices have led to a series of privacy breaches. On the other hand, people say that in many cases, “privacy for convenience” is not voluntary, but Forced to helpless choice.
Most netizens worry about privacy leaks
In daily life, we often encounter such a phenomenon. For example: using a takeaway APP to order a meal, the address, the phone is essential. At the same time as the convenience of selection, this personal information is naturally delivered.
In addition, there are endless circle of friends "small test" penny buy, etc., are virtually obtain user information, at any time it comes to privacy issues.
In response, many users said that their intention was to seek convenience and entertainment, and did not know the risk of information being stolen. This shows that people's sensitivity to privacy protection is weak. But at the same time, they said that they are still very worried about the privacy leak.
I have to admit that huge data has supported the booming Chinese Internet, but it also threatens the privacy of users. It is hoped that enterprises can rationally develop data and protect user privacy while providing users with service convenience.
The user is caught in a strange circle
Of course, in addition to the above examples, there are many “voluntary” information disclosures. For example, some software has to open related permissions.
Or take the ordering APP as an example. Download and install a take-out app, and a request to locate the mobile phone permission will pop up. After the author selects “prohibit”, the page always displays “address is wrong”, and manually searches for the business and product name in the search bar. Both show "No search results nearby."
However, the author sets the "mobile phone location" of the rights management to "allow", and then opens the app again, the search results appear, and the order can be placed normally.
These Internet products seem to respect the user's privacy, but the operation is naked "hegemonism." Carefully read the permissions that have to be authorized in the relevant APP, many of which are unnecessary features.
Just like the real experience of a netizen, "1, if you do not enter the mobile phone number, you will not be able to use it; 2. Enter the mobile phone number to agree to the registration agreement; 3. The registration agreement states that entering the mobile phone number means that the company can push various advertisements; 4. All information leaked from the company is not the intentional behavior of the company. The individual employees are not responsible for the company; 5. The company has the right to include all the information that the company has technical strength. If you object, you You can choose not to use it."
He believes that almost all products can find the above five information inclusion strategies. It gives you a choice on the surface, and this choice has intensified the unequal between users and businesses.
In the era of big data, many users are "voluntarily" to choose to use privacy for convenience, and there is always some helplessness. If these phenomena are unavoidable, then it is hoped that users will enhance the protection awareness of privacy, and enterprises will protect users' privacy and rights while rationally developing data, and the regulatory authorities will strengthen law enforcement.

Chlorine dioxide (ClO2) has been recognized and confirmed by WHO and EPA (USA) as safe, efficient, wide-spectrum and powerful bactericide. It is internationally accepted as the ideal substitute for Chlorine Gas (Cl2). Waterman brand Chlorine Dioxide Powder is adopted unique formula of ClO2 by Nanjing University of Science & Technology. It is a composition of three chemicals with safe and efficient features. After diluting with appropriate volume of water, it will produce ClO2. It has broad application prospects with international leading technology. Characteristic: 1. User-friendly operation: Dissolve in water directly and rapid activation under the circumstances of low-acidity and low concentrations. 2. A high rate of activation: More than 95%. 3. Good reliability and security: Transport, storage security, activation process without putting irritant smell and no harm to people and livestock.

Chlorine Dioxide Disinfectant

Chlorine Dioxide Powder, Chlorine Dioxide Disinfectant, Chlorine Dioxide Tablet

Nanjing Ligong Shuifu Environmental Protection Technology Co.,Ltd. , http://www.watermanclo2.com