Who sold your privacy?

  Just over a quarter of 2010, the protagonist on the Internet seems to have changed a lot. The indecent video of a model called “beast” just subsided, and the attention of netizens was taken away by the director of the Guangxi Tobacco Monopoly Bureau. In addition, Luo Jinfeng, who believes in “Xinfeng sister, has confidence,” and “sharp brother” on the street, have all rushed in this late spring.

  Recall that more than a decade ago, people who were in BBS and chat rooms often said: On the Internet, no one knows that you are a dog.

  ”Today, not only do you know whether you are a male dog or a bitch, but you also know what dog food you like to eat.” Internet marketing person Liu Qingsheng commented, “You think, there was no Facebook, no Twitter, no human flesh search ten years ago, you I want to make a point of personal privacy, a little name, but unfortunately no place!”

  Privacy, in the age of the Internet, changed from a black box to a glass jar. Everyone has the potential to be the goldfish inside.

  The only difference is that some people exchange their privacy for fame, and more people are frightened, but they have nothing to do.

  Back door worry

  This was the reception held during the second negotiation of the Kuomintang and the Communist Party in 1945. In the intertwined, the young party leader Li Wei (Liu Yiwei) wearing a long-sleeved shirt, and Chen Cheng (Li Qiang), who is wearing a uniform, walked and talked.

  “I heard that your 360 security guards are free?”

  ”Lifetime is free, we have no plans to make money at all.”

  ”Oh, don’t think that you can deceive the people with a free scorpion.”

  This dialogue is not from the film “The Founding of the People”, but a video clip that appeared on the Internet: “The Back Door”. Next, the “producer” borrowed the secret of Jiang Zhongzheng and Wen Yiduo, and delivered a shocking secret: a 360 security guard for Internet security software with more than 200 million users in China, behind the “free” There is a conspiracy. They set up a backdoor program in the software, and will “can” steal user privacy information, including pictures, bank accounts, online game accounts, QQ, etc., “when you want to make money, you can earn.”

  Since mid-March, this short video has appeared on the Internet. Because of its excellent screen switching and sound production, it has covered major video websites in just two days, and the video links are spread across various online forums. This makes people think that as early as February of this year, Rising called Qihoo 360 security guards to install “backdoors” to users’ computers, and read user privacy files arbitrarily. Since then, the two have had a “back door” and then slobbered.

  The most dramatic scene is that when an external power company commented on the matter, it claimed that Chinese-made software generally has backdoor procedures to steal the privacy of users. These domestic software include Rising, QQ, Thunder, 360 and so on. Whether it is a spoof or a spoof, all of them are defeated by a scorpion. “If there is only one stealing privacy, we can’t vote for it. But if it’s all in the industry, what should we do? With the advent of the mobile Internet and cloud computing era, more and more web services need to upload data to the server. At the end, is this a big increase in the possibility of privacy leaks?” A user is confused.

  Lv Benfu, deputy dean of the Graduate School of Management at the Chinese Academy of Sciences, said that netizens don’t have to be so scared: “The words like backdoor and privacy do have a lot of intimidation for many people, so using privacy to fight against competitors has also become a kind of New business strategy.”

  ”Now when you use the Internet service, you will upload some information, such as the version number of the operating system, the version number of the browser, and the URLs you use. If you refuse to upload this information, then the Internet is very useful. It’s not good. These uploaded information cannot be used to identify the specific information of a particular individual and cannot be called personal privacy of the user.” Liu Qingsheng said.

  After the reporter opened this video, he also found that the film was only published in the name of “friends” and did not disclose any producer’s information. According to common sense, the author of the spoof video usually learns Hu Ge, and in order to be famous, he wants to write his own name. However, this video has cost a lot of money, and the use of multiple dubbed videos is generally only possible for a professional team to produce, but the person who posted the video has a low profile.

  Perhaps in response to this “big film”, 360 Security Center announced the “User Privacy Protection Commitment” and handed over its source code to the China Information Security Evaluation Management Center for hosting, saying that if Internet users suspect 360 violates user privacy. The “back door” can be complained to the Consumers Association, the Ministry of Industry and Information Technology, etc., and then the acceptance department entrusts the China Information Security Evaluation Center to conduct the test.

  Who is robbing your privacy?

  Many people will continue to receive sales calls from strangers, and they will know that the caller knows your personal information. At this time, everyone will feel personal concern.

  Many people still remember that at the end of 2008, a 31-year-old woman named Jiang Yan filed for divorce because her husband had a third party. She jumped from the 24th floor and committed suicide. In the “Death Blog” written during her lifetime, she blamed her husband’s suicide for her infidelity and posted a photo of her husband and a third person on her blog. Subsequently, the netizens launched the “human flesh search” in the name of “justice”, and publicized the personal information of Faye Wong and his family. Faye Wong was “wanted” on the Internet, and real life has been harassed many times. As a result, he sued the relevant website, and the court found that Faye Wong’s privacy was violated. However, not everyone is as lucky as Faye Wong, and a large number of online privacy infringement cases are finally lost. It seems that the evidence is in hand, but in the end it cannot be considered as privacy; even if the evidence is finally recognized as privacy, the lawsuit hit the Year of the Monkey.

  If you don’t believe in the power of search, you can try it yourself.

  The reporter entered the name of a colleague in Google’s search engine. The homepage of the search results appeared on the page of a recruitment network with the detailed resume of the colleague, including age, marital status, home address, and mobile phone. information. The reporter called the colleague and the colleague was shocked. He rushed to the Internet and found that his resume was filled out on the website three years ago. Now, search engines have a “snapshot” feature, even if the site deletes expired data, but it is still possible to search for these resumes through the “snapshot” function of the search engine.

  However, with the rapid advancement of technology, Trojans, which were originally aimed at stealing valuable accounts and equipment, are becoming the main force for stealing personal privacy. After stealing the privacy of the victimized Internet users, the consequences will be much more serious than the hacking, such as extortion of money and even further fraud to the relatives and friends of the victims.

  A video called “The Young Women at Home Dressing” was once madly reprinted online. The person who was photographed was called Xiaohong. When she was still in the doldrums, another dressing video was released to the Internet again. The name of this video was “Sneak shot of a hot young woman”. In desperation, Xiaohong can only report the case. The police found that Xiaohong’s dressing process was actually taken by the camera of the computer at home. The criminals who mastered the hacker technology implanted the Trojan with remote control function into Xiaohong’s computer, and then controlled Xiaohong through remote control. Computer, took all of this.

  Ma Bin, a financial channel host who is deeply loved by the audience, stepped down because of privacy leaks. He once misled a Trojan horse program on the Internet, and the computer was remotely controlled by criminals. On August 8 last year, Ma Bin’s group of “semi-nude photos” appeared on the Internet, causing an uproar. The Trojan manipulator tried to use the “semi-nude” to extort from Ma Bin. As a result, the manipulator was captured by the police, and Ma Bin disappeared on the CCTV screen. “Ma Bin read the newspaper” was changed to “reading the newspaper time”, the host also became the “wealth story” Wang Kai.

  Not long ago, some people on the Internet joked: Since the “Diary of the Secretary” flowed out, the number of killings of a famous anti-trojan software increased sharply. Many people worried that their diaries or photos were stolen by Trojans and they rushed to kill Trojans.

  They are priced for privacy

  ”It is necessary to establish new privacy rules to regulate this increasingly transparent world,” Google CEO Eric Schmidt said in a public speech. However, even Google, which adheres to the principle of “Don’t beevil,” is widely criticized for its inadvertent exposure to indecent images.

  It’s all about the evils of interest.

  How to effectively protect the privacy of citizens on the Internet, the United States provides a model for learning in this regard. In April 2000, the United States introduced the first federal law on online privacy, the Children’s Online Privacy Protection Act. There are also many related laws, such as the “Interim Regulations on the Protection of Citizens’ Privacy Rights” and the “Privacy of Privacy and National Information Infrastructure” as an auxiliary means of self-discipline in the industry.

  In addition, many companies in the United States have set up a chief privacy officer to regulate their own privacy. The Chief Privacy Officer (CPO) is a new senior management position that has emerged internationally. It has emerged in the era of the Internet, the business age and the rule of law, where privacy issues are becoming more and more sensitive.

  In China, the situation is just the opposite. When personal privacy information becomes increasingly insecure on the Internet, when national legal policies have not yet been introduced, and industry self-regulation has not yet been established, Internet companies in particular need to establish a set of self-regulated and self-regulating rules and regulations to ensure the information uploaded by Internet users. Will not be easily leaked. However, most companies have no feelings about it, and even a few companies are trying to achieve the “commercial value” of personal privacy data.

  On March 15, China Software Testing Center released the 2009 China Website Personal Information Protection Evaluation Report. The report shows that the Internet industry, such as marriage, recruitment, e-commerce, etc., has become the hardest hit area for privacy leaks, especially the scores of recruitment websites have even failed. What’s more, some recruitment websites sell these personal information to some training institutions. After analyzing the intentions of job seekers, the training institutions sell training programs to job seekers by telephone.

  Among the 13 dating websites that were tested, there were 7 companies that failed the company, and the proportion was over half. When registering a dating site, users are required to provide personal information including height, weight, income, educational background, opt-in intentions, contact information, etc. These large and extremely private information are of great commercial value. At present, on the Lily Online, only 15% of the members of the real front-end real name are displayed. The other 85% of the members are anonymous because they are worried about the disclosure of personal information.

  A survey by China Youth Daily also corroborated the seriousness of the privacy breach. According to the survey, 88% of respondents were troubled by the disclosure of personal information.

  For your personal privacy, it is completely price-priced for the merchant. A CD with tens of thousands of boss information may cost only three digits, and each person’s information is worth only a few cents.

  At the end of March, Taobao, China’s largest e-commerce website, announced a high-profile announcement of the underlying data. Taobao divides the data into two categories: one is macro data for iResearch and Analysys International; the second is for underlying transaction data for social individuals and institutions. Organizations interested in these data can pay for it, and Taobao promises never to disclose the privacy information of merchants and buyers.

  But who is going to supervise it? Who can guarantee that Taobao will not violate its commitment?

  The difficulty of privacy protection

  On the Internet, the most fundamental reason why personal privacy protection has become a mess is that there is no perfect law to ensure that those who violate personal privacy must pay a sufficient price. For example, so far, China has not legally defined privacy rights as an independent personality right, and there are no specific laws and regulations on the protection of privacy rights. Only in judicial practice, it is recognized that the right to privacy is attributed to the right to reputation. Protected, or as part of the general interest.

  However, one problem that cannot be ignored is that the Internet is developing rapidly both in technology and in application. Laws and regulations must keep up with the development of technology, just like an old cow panting and chasing the running train.

  In March of this year, the New York Times wrote: “On the one hand, because people rarely read these statements, on the other hand, because these statements are difficult to understand, and can not cover today’s complex data processing operations.” Experts said that users online When using your own personal information (birthday, address, credit card number, browsing habits, etc.), there is usually no substantive choice. Now you have to find a job to hire a website, buy more things to the e-commerce website, and make friends to the community exchange website. All of these require you to upload your real information completely, otherwise the work can’t be found, things can’t be bought, and friends can’t pay.

  Due to the professionalism of network technology, online privacy leakage is usually hidden. It is difficult for netizens to find out in time, and it is difficult to find rights through judicial channels, because it is very difficult to identify and prove.

  How to protect personal privacy has become an urgent issue in the Internet industry. Chinese Internet companies have finally taken the first step in self-discipline and self-regulation of user privacy information protection, but the situation is still not so optimistic.

  In fact, not many people know what privacy is.

  ”You have to protect your privacy. You must first understand what privacy is. Tell you that 99.99% don’t know what privacy is. You can’t find anything in the legal provisions.” Liu Qingsheng pointed out The key to the problem.

  Western society is a society with developed privacy rights. The definition of privacy is very clear. Privacy is often referred to as “personal information”. In accordance with the definition of the EU information port, it refers to any information that indicates or describes a natural person, and is information that can be associated with a particular individual, including name, signature, Job number, social security number, telephone number, insurance policy number, job title, financial status, account number, etc. Personal data does not include comprehensive information that does not identify a particular individual.

  Apply this definition to the news of the personal transaction data that Taobao wants to open. You can see that if the data that Taobao sells to a third party is only the information about the product variety, specification, quantity, time, geography, etc. of the transaction, or the transaction. Information such as age, gender, etc., does not involve personal privacy, because third parties cannot accurately locate the trader’s personal information through this information.

  However, if Taobao sells natural person information for each transaction, such as the trader’s phone number, ID number, order number, etc., to a third party agency, then this is suspected of infringing the user’s privacy rights.

  Some of the personal information is sensitive information, including information about the individual’s race, ethnicity, political opinions, religious or philosophical beliefs, union membership, information related to the individual’s health and sexual life, and biometric information such as Fingerprints and voiceprints, as well as information related to crimes, allegations of crime or any related procedures.

  Nowadays, the “hepatitis B” that has been raging in the society is a sensitive personal information and an important part of personal privacy.

  The root cause of this privacy chaos is that neither the law nor the individual treats privacy as a right. Privacy is a kind of personality right. A person’s privacy is violated. It is equal to his or her personality being offended. It is the same nature that a person is beaten and shackled on the street for no reason. More specifically, the right to privacy refers to the personal right of the private life enjoyed by citizens without the unlawful interference of others and the confidentiality of private information, which is protected from being illegally infested, known, collected, utilized and disclosed by others. It is generally believed that the subject of privacy can only be a natural person, and its content is authentic and concealed, mainly including the right to personal life, the right to privacy of private information, the right to secretive personal communication, and the right to use personal privacy. Privacy is one of the most basic and important contents of the citizen’s personality rights, which is accompanied by the understanding of human dignity, rights and values.

  Obviously, during the period of social transformation in China, when the incidents of frequent mine disasters, peekaboo, and death are continuing, it seems that the “high-level” personality right of privacy is still extravagant.