Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall
It has shown us the tip of the iceberg, a glimpse of the underground world of China's Internet, which stands five hills: Hackers (Hacker), pornography, gambling, black PR and five Maoist parties. They drift away in the legal edge, but affect the average user's network environment, and even participate in the development of ground rules.
There are places where there are rivers and lakes, mobile Internet also exists underground world. and PC Internet is different, it is not light, more time is to cheat and other compulsive means mu self-interest, the most outstanding bad performance is piracy and crack, channel business tamper with app profit.
Guxiaopo in NetEase Technology issued an article, exposing mobile internet stealth industry chain underground order:
Android apps easily cracked channel to swap SDK ring money
In some application shops appear "Cottage" application is not plagiarism, but will be the original application of the decompile, after tampering through their own channels live third party channels to the shelves.
Using cracked apps, channel vendors have three ways to make money, 1, the software built-in advertising SDK is replaced by the application store their own advertising SDK, forced to earn advertising advertising costs; 2, add malicious code in the background secretly download app, after installation automatically delete, according to the number of activated charge promotion fee; 3, replace application payment system , point the payee to yourself, or add a script to the login system to steal the user account password.
Where the malicious code in the morning and other users do not pay attention to the time to download the app, secretly downloaded after installation in the background automatically deleted, the user itself does not know, but the channel can be in the way of CPA valuation by activating the amount of money to the developer, every activation of a mobile phone to earn two yuan The network is good, a mobile phone can be downloaded dozens of a night, and the user is completely unaware. and malicious code is usually not included in the pirated app, so they can easily through a variety of security monitoring, after the operation of automatic networking from the cloud to download malicious script, after the completion of the deletion of local data, to no shadow.
One of China's third party application stores, a channel personnel revealed that do most of these channels are to do SP origin, they will go to download apk, through the bottom of the technology to crack, in their own channels to the shelves, or to crack the overseas stand-alone game put on a number of large channels to promote, and then push ads through these games.
"Sometimes one or two people can do such a network alliance, such as my own crack, you are an application store or website editor, you help me do promotion, I earned the money and you are divided." "The source said.
Piracy applications flooding Android developers or yielding or tolerating
If you crack the APK source code, you can extract the resources, made into another game online, play the same as the original, such software is usually free download, through the implantation of ads or malicious code and other ways to profit. And some Third-party app stores are willing to tolerate such behavior in order to attract traffic and downloads.
In fact, at home to do software cracking and piracy does not have too many risks, because if a developer to find the door, the channel can be divided with them, most developers will not be prosecuted, if the lawsuit, will not get too much compensation.
Android's open ecology has led to problems such as piracy and cracking, and opening up as Android's biggest advantage has become its biggest disadvantage.