Absrtact: Not long ago, just ended with the charm of the mouth of a war of millet, recently again by public opinion pushed on the cusp. According to Reuters, Taiwan's administration issued a statement on its website in Tuesday saying that some of the millet handsets had automatic return of user data to their north
Not long ago, just finished with the charm clan "saliva war" millet, recently again by the public opinion pushed on the cusp. According to Reuters, Taiwan's administration issued a statement on its website in Tuesday, saying that "some millet handsets have automatic return of user data to their Beijing servers".
The Taiwanese authorities are now investigating whether Millet has a cyber security threat and will make a decision within three months. The news comes as the debate over whether Millet handsets will be banned in Taiwan is on the web.
In fact, from the inception of Android, because of its open source of a series of security problems have been there. All kinds of suction fees, malicious applications, net silver Trojans, worms, spam messages, harassment calls, and so on, at all times threaten the user's digital assets security. A large number of Third-party security application software has also emerged. Moreover, many users do not have the habit of installing security software, so once the outbreak of similar "super mobile phone virus", it must be regretted. In fact, the best solution is that the operating system itself has excellent security protection capabilities.
Of course, not only the Android system, but also several other major operating systems have the same security implications. Whether it was iOS that had been exposed to multiple backdoor services, or Windows Phone, which was thoroughly cracked by foreign hackers, and even the BlackBerry OS, which has been touted as highly secure, has been criticized by users as the "most dangerous system" after unlocking the Android simulator. This has made us think of the Alibaba YunOS mobile operating system, which was recently shortlisted as the only mobile operating system for the "2014 Central Government Procurement Agreement supplier list". After many operating systems have burst into security problems, why can it get the most stringent security requirements of the government's favor?
From Ali's YunOS in accordance with the Ministry of five level of security standards to build, through the system from the bottom up layer, from the confidentiality, integrity, availability and anti-repudiation, and other aspects of the construction of a complete security system. In the system itself with the security Software "Security Wizard" more built-in ten basic and security protection functions, including a key acceleration, garbage clean-up, intelligent power saving, harassment interception, mobile phone anti-theft, rights Management, privacy, anti-fraud, self-starter management and flow monitoring, comprehensive coverage of the user's daily security application needs.