Secret founder Lin Chengren: Anonymous social, "secret" you don't understand.
Source: Internet
Author: User
KeywordsFounder secret Lin Chengren
Never before has an app been able to generate explosive growth on the first day of the line, and no app has ever raised so much attention in just a few days, and anonymous social software secrets "like a bomb thrown into the crowd blew up masks that people wore for a long time." Secret "comes with criticism, some say it inspires the evil side of human nature, others say it makes people more real. With these questions, low-key secret founder Lin Chengren received an exclusive interview with Sina technology to talk about the birth of the secret, and to answer questions about the secret. From the personalized recommendation engine to the social app Lin Chengren and his team core members from the Amazon recommendation System team, in 2009, he and the team returned to business to engage in information recommendation research and development. You may have never heard of our product, but you must have used it, but you don't know it. "Lin Chengren said that their earliest products are information Web sites and no find articles recommended Plug-ins, the former can be based on interest to recommend users may be interested in information, the latter open to third-party use, can be recommended according to the content of the article related reading, Phoenix, NetEase blog, Caixin network content sites are no recommended plug-ins users. Lin Chengren recalls that the highest peak of the plug-in has hundreds of thousands of sites installed, covering more than 200 million active users. But he gradually realized that the user has gradually shifted to the mobile end, the PC-side plug-ins, although the flow is very large, but completely free of charge, it is difficult to produce good business model, and in the mobile end of the zaker and so has made a big advantage, must turn to a better direction of breakthrough. I'm a heavy social user, and I've been through Friendster, MySpace, Facebook, and later in my micro-trust circle. I have a deep understanding that Facebook has hundreds of friends, but the more friends, the lower the desire to release, because there is always something inconvenient for some people to see. Lin Chengren said, in micro-bo, micro-letters have a similar experience, the beginning of a lot of hair, time a long hair is less. Lin Chengren that the real name of the social network has a natural monopoly attributes, strong and strong, such as micro-letter growth, similar products will be difficult to have the opportunity. In the recent year, anonymous social rise has aroused his concern. Anonymous social way is particularly suitable for China, we Chinese people will be a little polite to face, there are words are not willing to speak directly to the face of superiors, seniors always wear masks. So, in China, the truth is particularly valuable, but there is no place to see it, so we think that anonymous social platform in China will have special needs, the launch of secret development. "Lin Chengren said. The strict protection of privacy can be assumed to be false. Since it is an anonymous social networking site, ensuring the anonymity of the platform is at the heart of the entire social platform. Lin Chengren said that in order to ensure user privacy is foolproof, the secret to do the most stringent privacy protection design: First in the entire app interface you can not find any way to identify the author, all the secrets or comments are not with the author's name, Avatar, each secret comment will be randomly assignedAvatar, different secrets of the head is not the same. In the data transmission, the user's address book and password will be one-way encryption and salt processing, internal personnel also can not know which user issued the secret, even if the data is stolen can not decrypt. Not long ago, dark clouds on the platform of the user said that the secret existence of logic defects, leading to the specific publisher can be guessed which friends, privacy protection in the form of fake, hit percentage hundred. Lin Chengren responded that he was also a bit shocked, immediately contacted the user to understand the details, and later learned that the user is only a favorite secret user, the vulnerability has been proved to be ineffective, according to the user-supplied process and can not accurately guess who published the secret user. The user thought that one of the phone's add to the Address Book, and then to refresh the secret, which new secret was refreshed, you can determine who published the article. In addition, there are users that can use the binary, that is, each delete half of the address book, and then to refresh the secret, step-by-step approach, and then the user test found that both of these methods are not feasible. "Lin Chengren said. The disclosure of the mechanism of content formation Lin Chengren further explained that the secret main timeline "form the most central way is to read the user's personal phone address book, Address Book Friends in the interior is defined as 1 degrees, Friends of friends, or friends forwarded, praised things, may also appear in the user's timeline, which is designated as 2 degrees in the interior. The display of 1 degree content is sorted above 2 degree content. But not all Address book friends are 1 degrees, in order to take care of privacy, there may be a small number of show friends "user is not the Address Book Friend, show 2 degree content is not necessarily a friend of friends." That is, 1 degrees and 2 degrees are randomly disrupted by a small amount to ensure that the publisher is not guessed. If the user's mobile phone address book friends less than 3, the secret is completely unusable, and the user address Book is less, The secret will show from the circle of friends, only friends more time will distinguish is friends "or friends". In order to quickly get users, the secret also uses a controversial design, users can not pass the text to verify the mobile phone number directly using someone else's mobile phone login. It's not a loophole, it's a deliberate design. Lin Chengren said, on the one hand, is to maximize the reduction of user registration threshold, because the cell phone message authentication code is very unstable, such as NetEase easy to start on the line, there are a large number of users can not receive the authentication code. The second is because even if the use of other people's mobile phone number is meaningless, because you display the content is to read your mobile phone address form, and the owner can use the password to retrieve the password at any time, you previously released all the content will be automatically emptied, but also may cause the device was banned. Celebrity discourse Power has been weakened by an unprecedented social way of anonymity, the novelty of the use of experience, inadvertently aroused the ugly side of human nature, rumors and unfounded accusations quickly flooded a lot of people's circle of friends. Media people Shanyi Air after 4 days of secrecy, determined to delete the secret forever, will not be installed on it, never. He published an article in his own media pingwest headline saying that when you find aSome of the news is absurd, ironic and even downright defamatory and offensive, and instinctively unload it angrily. "The secret is encouraging us to do such a thing: be assured that you don't have to take any responsibility for what you said, because you can't be responsible." "Lin Chengren's response to these statements is that you see only your own circle of behavior." One of the secrets of the secret is that every circle, is different, the student circle secret love and vindicate is their theme, in the investment circle, the mainstream topic is project and Investor insider; in the entertainment circle, in the Internet circle in every circle of the content of the discussion is completely different. "Internet circles and media circles are special, users like black people, there are many people are being discredited, especially from the media." "These people have a lot of fans on their real-name social platforms, and they have some influence in micro-blogging and micro-letters, but they are also Lin Chengren in private," he said. We are also designing a reward and punishment mechanism that allows users to pay for what they say instead of just being able to slander others. "Celebrities have no power in secret, no matter who you are, your comments are completely equal in secret, the power of celebrities has been weakened, so some media people have resisted the secret." Lin Chengren said that the secret to the content of the audit has invested a lot of power in the beginning, for rumors and attacks as long as the name will be limited to spread, ban or even the number of penalties. When it comes to secrets that may involve sensitive information about politics, Lin Chengren seems very relaxed. He revealed that he had been worried about such problems before the line was launched, but after running out, he found that few people had discussed politics, until later it became clear that political issues were difficult to spread in a coterie of social platforms and that users were hardly concerned about such topics. Once someone talks about it, the secret policy is also an iron fist, involving politics immediately. We are now in fact only a few weeks, the future of product shape may also be adjusted according to the actual situation. We hope that the secret can meet this demand, so that each user can put down their identity to express their inner thoughts, focus on the content of the information itself rather than the identity of each other. Lin Chengren said at last.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.