Now the industry has basically reached a consensus, location services will be known as the largest mobile internet bright spot, so, about location services site springing up, but also by the investment bank's hot. But with the popularity of this location service, the risks follow.
Last year Tencent was still in lingering with 360 of stolen user computer data, and Google was caught in such embarrassment. According to foreign media reports, Google's Android smartphone and Apple's iphone regularly transmit location information back to their company's primary servers, and the Android phone collects location information every few seconds, sending it back to Google several times in an hour. In a letter to U.S. lawmakers last year, Apple disclosed that its mobile phone had "intermittently" collected location information and returned it two times a day.
In fact, in principle, whether it is Google or Apple, or other similar companies with intelligent operating system management rights, will intentionally or unintentionally steal user information, on the one hand is used to improve products, on the one hand, in order to analyze customers use habits in order to develop product benefits, there is to leave foreshadowing for future use Bill Gates, it is said, had the story of "pulling the plane back" to the tarmac at the airport because of the easy operation of computers on the wrong planes. When you build your house on someone else's foundation, you have to take the risk of digging tunnels or burying mines.
Tests on the Android phone show that the location information it transmits includes the phone's unique identification code. This identifier is only relevant to the location and does not contain additional information about the user. Users can change the code of the identification code by performing "Restore factory settings". The Location collection function is very important to Google, which helps it provide accurate transportation maps and other services, as do other companies.
Location services can actually greatly enhance the value of mobile Internet applications, but also gradually become the standard for most mobile Internet applications, users need to consider when using, between personal privacy and business facilitation, and Internet companies and operating system providers also need to give users the opportunity to choose, Do not force users to use or secretly steal information, but also to give users a sufficient intensity of reminders and warnings, so that the mobile Internet as much as possible for the benefit of the people rather than social chaos.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.