The cloud privacy behind the "Transparent man" Hollywood pornographic door in the big Data age

Source: Internet
Author: User
Keywords nbsp Hollywood Big data age pornographic privacy
The cloud privacy behind Hollywood pornographic

Now the "Repair computer may reveal the photo" era has passed, now the term is "cloud photos." Starting with Edison Chen, Chinese netizens are, for the first time, familiar with the pornographic film, and this time, dozens of of Hollywood star girls Undressed and let us again worry about the privacy of large data, if large data as a technology, in the future rule people's work and life, So how do we protect our privacy in the cloud?

, anyone could be the next person who leaked the photos.


Star Blog

For now, there's no point in discussing why women should take such pictures, and it's even more worth noting how private photos run on the public web. This has to be mentioned about Apple, which for the time being, the exposed actress is using the iphone, and the photos are there or once in the iphone.

Apple said in Tuesday that the Hollywood actress pornographic scandal was caused by a targeted attack on the celebrity's icloud account. The iphone's photo store is divided into two parts, part "local", part of it is "photo streaming", for example, you take a big picture with your iphone, unless you specifically set it, in general, the photo will first be stored in the cell phone itself, and then a copy will also go into the "photo Stream", Uploaded to Apple's servers via Apple's icloud cloud service. If you want to delete this photo, it is necessary to delete the local one as well as delete the server. However, Apple also said that none of the cases surveyed by the company led to leaks of information because of a direct intrusion into the system.

your information on smartphones is not safe

"This is just one of a series of alarms that people have overlooked," said Chris Crowley, a mobile device network security expert at the U.S. security organization. People always accept the risk of cloud storage of personal data to some extent without reservation until they really see the people they are having trouble with. ”

In addition to the potential vulnerabilities of the system itself, the applications installed on the phone can sometimes become "time bombs". An iphone user, for example, has 25 applications installed on its mobile phone. There are 11 requests for "Locate service" permissions, 7 for "Address Book" permissions, 11 for photo permissions, 5 for microphone permissions, and 5 for camera permissions. \ n This shows that the mobile phone software to privacy and the need to rely on how high.

Of course, the problem is not just for Apple users, Android's system is open, and software has a higher demand for privacy and sensitive permissions. The author inquires a colleague's Android handset to discover, this handset installs the application software altogether 60 paragraph. The requirements for privacy and sensitive permissions are as follows: Send SMS 9, get SMS content 15, get contact 20, get phone records 20, locate mobile phone 29, get mobile phone identification code 46. Some software excessive authority requirements, most likely for personal privacy and sensitive information leakage buried hidden dangers.

Large Data Age: Privacy in exchange for a comfortable life

Hollywood "Yan Zhao Door" The most noteworthy "large scale", is not the female star stature of the "large-scale exposure", but the network era of personal information "large-scale exposure." In the big data age, there are too many ways to allow a person's privacy to be violated.

the "Transparent Man"

in the age of large data

In the networked office and large data age, regardless of whether you are not on the Internet, information about you is distributed across the Internet. Did you find that when you turned to another portal to watch the news on your shopping site, next to play is actually just concerned about the commodity information; or you buy Unicom's contract machine, after the original mobile global business into the Unicom package, not a few days there will be mobile send SMS to you to promote preferential tariff activities , I hope you will continue to be a mobile customer ...

Behind these seemingly accidental events, there is an invisible hand in the manipulation, which is closely related to our big data. Every day we surf the internet, play games, use mobile phones, go to the supermarket, stay in hotels, buy tickets have left footprints, everyone's search records, browsing records, social relations, shopping lists, reading books, travel experience, medical records, etc. information will be collected and recycled.

Scientific Revolution or "data tyranny"?

Yes, big data surrounds our lives, and the technology has blossomed in many fields: in agriculture, for example, there is a climate company in Silicon Valley that predicts the annual production of farms based on rainfall, temperature, soil conditions and the relative availability of crop yields over the years, and then sells personalized insurance to farmers. In China, Alibaba, based on the trading status of small and medium-sized enterprises in Taobao, screened out financially healthy and trustworthy enterprises, and issued loans without collateral. Currently has lent more than 30 billion yuan, the bad debt rate only 0.3% ... The scientific community and the public opinion have given large data ratings. The Wall Street Journal has called the Big Data Age and the intelligent production and wireless network Revolution the three major technological changes leading to future prosperity.

But it also raises fears of a "data tyranny". Many companies emphasize that they are "anonymous" in collecting, storing and analyzing data, but this may not be the case. According to a study in the British Science report, each person has his or her own mode of action, and 95% of people may be identified. The more data available for analysis, the less likely it is to remain anonymous, identifying a person as long as 33 bytes of information. According to a survey, 75% of respondents said they did not want companies to store personal data, and 90% opposed companies tracking their own online records. Internet philosophers fear that some large data applications will bring "data tyranny".

even involves national security

In the face of the network of countless double silently peeping "online eyes", it is clear that netizens will increase the sense of personal information unease-not to mention the "prism door" after events such as "The Bigger Eyes". From the NSA's exposure to the American people, as well as to many national leaders and civilians, it is possible to understand that Internet privacy may not exist.

The so-called "Prism plan" means that the U.S. government has the right to extract the user data from Google, Yahoo, Microsoft and other Internet giants, including who you have recently sent messages, what you bought on Amazon, when to call and so on. It can even be remotely activated by the back door to monitor the gyroscope, even if the phone is off the state. The news came as consumers questioned the behaviour of giants such as Apple, Google and Microsoft, although they said they had no backdoor or eavesdropping on the system.

Cloud Privacy: How security protects large data and privacy is not a paradox

Now every tech company is doing research on big data, which is a trend in the future, it teaches people excitement, but it also brings about privacy concerns. At the same time, the Internet information storage is facing the same problem, such as the Hollywood leaked photos are stored in the "cloud." In China alone, as of March this year, the number of personal cloud users has more than 351 million people. Who will protect the personal data collected by technology companies and the personal privacy uploaded to the cloud? If there is no strict privacy law to regulate, personal information once leaked, will bring huge security risks to citizens ' lives.

The more development of the network era, the network of personal information security is more and more threats, the greater, for this, unworthy, away from the application of the network, not sensible, more unrealistic, and blindly appeal to the user individual "to improve the awareness of prevention" is clearly nowhere. The real way out is through legislation and enforcement against "peeping" profit-makers.

the relevant laws of our country have yet to be perfected

There are three kinds of models for the protection of Internet privacy in the world, the first is the model of industry self-regulation which is typical of the United States; The second one is the technology protection mode, which is to protect the users ' privacy and protect the users ' own, through some privacy software; The third is the legislation model, which is represented by the EU, It advocates that the basic principles of network Privacy protection should be legally established by the state legislation and the specific laws and regulations, and the corresponding judicial or administrative relief measures should be established on this basis.

However, at present, the level of privacy protection of personal network is comparatively low in our country. In 2000, the NPC Standing Committee made the decision on strengthening the protection of network information, in which the provisions relating to personal network privacy are mainly as follows: National protection can identify the personal identity of citizens and the electronic information involving the personal privacy of citizens. The personal electronic information collected by the network service provider and other enterprise institutions and their staff in the business activities must be kept in strict confidentiality and shall not be disclosed, tampered with, destroyed, sold or illegally provided to others. However, our country does not have a special network privacy protection Law, under the realistic conditions, we need to make clear the scope of citizen information security, the right content of personal network privacy and the legal usage of citizen's personal information in the form of law, and ensure the management and protection duty of personal information managers.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.