Anonymous social applications melee How to ensure security?

Source: Internet
Author: User
Keywords Raven no secret Secret application development
Tags access anonymous anonymous social anonymous social applications app app store apple apple market

Not long ago been anonymous social applications forced to shelve from the App Store due to infringement "no secret", just by way of "friends" back to the Apple market, but into new trouble.

In recent days, the famous "white hat" pig man Xiaolian broke the news on its Weibo, "no secret" network border can be bypassed, hackers can access the internal network access to a large number of servers and data, and leave a "dark cloud in July see" Reverie.

As the United States genuine "secret" type Secret official Chinese version into China, "Crow" "Oh" and a series of similar applications are also rumbled, the anonymous social market competition more and more fierce.

Information security is becoming their weakness.

"Secret" may be hacked

"No secret", said the user login phone number is irreversible encryption algorithm, even if the hacker access to the database, it can not restore the secret from which cell phone number, and only get the user's cell phone in order to know the secret of the publisher.

"The length of the phone number is limited, but the first three are certain, such as 138,139,156, so only eight digits need to be cracked." Yang Min, Associate Professor of Software at Fudan University, explained that the anonymization algorithm Rely on the existing technology, the algorithm strength is not high enough, the use of professional tools, you can calculate the number behind the phone number within a few minutes, for professionals, the number reversed back is not difficult.

Yang Min's explanation from the side confirmed pig pig man's argument.

"There's no such thing as a startup that's not a secret, and it's hard to test it thoroughly before the product goes on the market. Large companies such as BAT, with professional security engineers doing tests, are deprecated." 360 Web Site Security Director Hu Zhenyong told IT Times reporter, hackers directly through the system vulnerabilities, take away all the data, the so-called "drag library", App development company's strength lies in the product, but security awareness may be relatively weak, 360 in doing similar products Time, there will be security engineers to do penetration testing, internal infiltration is not successful, will let the system on the line.

Secret Chinese chief just entered China, said that although the Chinese version of the source code developed in the United States, but in the country has a dedicated team responsible for the service, and the server on Google, "as long as Google is not attacked, Secret will not be attacked "

Sun Ming, a partner at Chezhe Law Firm, believes that the use of anonymous social applications by users makes the information leaked to be a civil default, and the application development team violates the user's promise. If the in-house staff intentionally divulged information, they could sue the person concerned.

"Secret" App is not yet a commercial climate

Eight years ago, my friend created a secret network alone and served as a webmaster and administrator at a time. He was renamed as 'Black' Big Brother, 'replies to users every day to increase popularity, and soon after the secret network was closed because of bad information. "Practitioner 10 years of lawyers," high-quality blue-collar "recently found that a friend for many years without contact recently" comeback. " This friend is the founder of the encyclopedia Wang Jian, now the fire secret App and secret network, it is Wang Jian newly developed products in recent years.

However, angel investors, anonymous application of the business model is not clear, not easy to profit, angel investors McGonon told the "IT Times" reporter said that early investment can be considered, but this is a challenge in the commercial The probability of success is small.

In addition to information security, intellectual property is also a flaw in this type of App. Abroad, to copy the same product, will be subject to legal proceedings, but China has more than 20 similar products. Since May this year alone, there have been at least 8 anonymous social products launched, such as the "Raven" of the pop team, the "toast" of the main street network, the "secret ring" of YY and the "haha" Market competition can be described as intense.

The face of so many domestic competitors, the Chinese Secret team is not worried, according to its spokesman revealed that the Chinese version of Secret in product performance, user experience, followed the characteristics of the United States products.

Its spokesman said that before each launch of a new feature, it must go through a large number of trial, research and development, design are more sophisticated.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.