Why do I like the domestic secret application?

Source: Internet
Author: User
Keywords This that is inside domestic
Tags address address book anonymous anonymous social app application based class
Absrtact: The Secret app is on fire. This is the product that the team is currently devoted to. Just last week, I had the privilege of visiting one of the members of the team in Shenzhen. I first used the secret of this product, only to know that they did not find. This production

The secret app just got hot. This is the product that the team is currently devoted to. Just last week, I had the privilege of visiting one of the members of the team in Shenzhen.

I first used the secret of this product, only to know that they did not find. This product is the American popular application secret. The main direction is the anonymous social interaction of acquaintances.

I was going to ask them if there was a need for financing, but unfortunately, one of their co-founders told me that they had just made an investment before the secret product, which was December this year.

I was very excited when I first knew secret. The acquaintance of the relationship by Tencent to eat, unfamiliar with the strange society, social networking to now look, in addition to the unique temperament of the watercress, is some vertical category, but there is no big. If further subdivision, there are some is cock silk social, plainly is a group of the crowd of a goddess of the onlookers, and then receive a prop fee. But now, in addition to being eaten by Tencent has a relatively strong relationship between the sticky, the other categories are relatively narrow, the user's purpose is too strong.

But secret is not the same, it is based on the relationship between acquaintances, which is more in line with the social characteristics of domestic users. Do not know the people, the initiative to communicate the guts, or intentions are not too strong, dour under the hello will not have too much willingness to communicate deeply. Of course, with the exception of a certain purpose of the pick-up, and this is "done" after the two sides rarely continue to communicate.

At the same time it is anonymous social, most of the domestic users on the micro-blog, Friends Circle can speak out only a small part of their inner speech needs. In the domestic culture very much value relations, and the wind. What do you mean, relationship? What to say to someone, not to anyone who knows it. As you can see, the female white-collar workers in addition to work to say that the table is after work and girlfriends mixed together, men in addition to work is to find brothers drink wine. Why, because there's so much privacy.

But if anonymous socializing is based entirely on strangers, there is less power. Whisper is an anonymous square-style society built on the basis of complete strangers. This scene in the country, lost the system of acquaintances, it is easy to fall into a gender topic community. Because you and I do not know, there is no specific thing to say, then to discuss some of the private topics of public, what is the private topic of public sex? That's the gender issue. This is also I am not optimistic about some of the domestic app to learn whisper reasons.

To sum up, I think the application of secret is expected to become an important category in the domestic social field, is a powerful supplement to acquaintances and unfamiliar relations.

Then you will certainly ask, if Tencent also copied a secret what to do? My point is, first of all, Tencent internal certainly will have a class secret application; But you can rest assured that Tencent has no way to use micro-letter, hand Q resources to push it, micro-letter, hand Q product itself can not join this function, may do is Tencent other product managers or teams, these product managers and you are equal , perhaps within the Tencent they do not have enough resources and authority to woo like the entrepreneurial company so many people's technical team, that is, in the mobile phone book relationship, than you QQ ID and micro-letter ID to import users. But it doesn't matter, as long as you run fast, the privacy system of product logic design and development in place (this is very important), always in the innovation, optimization in the front, you still have a great opportunity.

At present, the relation chain of secret app is still the one-way relationship chain of mobile phone address book. To put it simply, your phone has a Zhang phone, and the secret app will automatically present Zhang on your phone, regardless of whether Zhang has saved your phone. Another example, Zhang phone has a phone called doe, and your phone address book has no Doe phone, in general, your secret app will not present Doe, but if Zhang points a red heart in Doe's content, you can also see Doe's three-point heart.

In order to do a good job in the early days to guide, to avoid users do not know what to say, but also to avoid the "three vulgar" direction of development, the secret app's operations team will be in your timeline every day to insert one or two introductory questions. Of course, the secret app makes an official distinction so that you don't mistake someone on your phone book. In addition, secret officials will also push on timeline some of the most important comments on the day.

At present, the team members have all been transferred to the secret app product development and operation, and no one has been dedicated to do it. Now the whole team is over 30 people. As the product on the initial stage, or completely copy secret, so responsible for the product is about two people, the operation of the two, the other are technology.

Of course, to move the secret to the domestic still need to follow up some localization optimization. Here are my personal suggestions.

1, is only the mobile phone address book relationship, in order to further expand the user size, you can log in when users do some of the tagged things, the purpose is to publish private content to provide the scene. And why? Because not everyone will save cell phone number, especially in the micro-letter after, a lot of people with the micro-letter ID replaced the phone number, but I do not have your mobile phone number, I still have gossip about your needs.

For examples of simple scenes, who is the girl in the school who is discussing the beauty of the next class? For this question, the class inside, the professional inside, in the department, even the whole school is interested in this problem there are a lot of people, but you can not have your class cell phone number, this situation can be through the information inside the school to do a label synchronization, of course, your school information only you can see, Outsiders can not see, but cloud data to the synchronous push to your school people.

Another scenario is that in the Office, you and many of your co-workers want to spit out a boss, but you do not necessarily have all your colleagues mobile phone number, but these colleagues are also on this topic can contribute to participate in, if in the registration, in the personal information to do a company's label, the label synchronous push, can achieve this effect, Of course, this label is only you can see, outsiders are invisible.

2. Join the group function. A person posting, other people watching, and can not meet the full needs of anonymous social. To give a simple scene, the unit to the discussion of a matter to make decisions, but we do not dare to speak real names afraid of offending people, then how to do? Related people pull into a group, but the group members of the ID, Avatar random virtualization pairing, so that people do not know what the group is specific what a person said what, such group discussions can let everyone without any of the issues of the open in the topic itself.

Of course, the product logic of joining the group function is more complicated. Because the front of the secret is anonymous, and the tick to join the group, it must be the first name, into the group at the same time to become anonymous. But it does not matter, there must be a solution, such as entering the group to log in the room number password settings, and based on the label into the group settings.

Finally, say, the most core category of secret products, the most complex is the privacy system of product logic, entrepreneurs refueling.




Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.