It is said that on the fictional ordinary day yesterday, the big thug revealed cases related to personal information security during a live broadcast at the party. Surprisingly, there was also a special report written overnight by Second Egg. I have finally understood a principle: telecommunication providers and hackers, thieves all mean the same thing - they want to sell your information to others for profit. The only difference is their methods of obtaining it.
There is no wall that doesn't leak. In nature, there is a food chain; among people, there are relationship chains; between information and information, naturally there are information chains. Just looking at the network, as long as you are a netizen, your nickname is definitely public. Your email and IM account are slightly more private, and your real name was originally quite confidential. However, in recent years, the vigorous movement of network real-name system and SNS has made your name and nickname become "naked". Through your nickname, email, and IM, the network services you have registered can be found, especially sites related to classified information. At this point, your phone number should also be exposed.
OK, it's already very dangerous, but you may not realize it yet. The network services you have registered can be searched based on your nickname, email, and IM. Let's list some common features and key points of these pieces of information:
1. Your blog
Most people write about today being their birthday, receiving many gifts, how they celebrated, etc. Please don't be too foolish. Besides your mother who really cares about your birthday, there are also thieves online. Of course, much more information might be disclosed through blogs.
2. Forums or communities you join
They could be music forums, movie forums... In short, understanding your interests by observing what type of forum you join is also key information.
3. SNS (Kaixin001, Xiaonei)
As mentioned earlier, your real name, and even more frighteningly, your hometown, elementary school, middle school, university, first job, second job... Most people are still too kind-hearted. The website asks you to fill it out, and you actually do it.
4. Find the classified information you posted
We look for houses, jobs, or other information online, leaving contact details such as email, then IM, mobile, landline.
With just the above four points, it's very likely that your @ will be compromised without using all the information. Domestic free email providers cannot guarantee the security of your email. In three or even two steps, the password can be reset. For example, Xinglang only needs two steps to reset the password. Once your @ is cracked, I think it will love someone else. Haha. Retrieve the account password for Zhonghua Yingcai or 51job using your email, log in, and check your ID number and other relevant information. As long as the network service is registered with this email, all passwords will be compromised. Naturally, online banking information will not be safe either. You can only pray that the person is not a thief after money. There are already four similar bloody cases among my friends.
Scared enough? But we need to stay calm. Carefully consider your email security questions and answers. They shouldn't be something like my name, my phone number, my hometown... These are all dead ends. However, you can set them up like this. For example, if the question is "Where is my hometown?" Your answer should be something like "It's raining today," which is unrelated to the question. Currently, such non-related security answers are relatively safer.
So dangerous, so should we stop using the internet? In fact, such thoughts are not realistic and too pessimistic. We all need to learn to protect ourselves. For specific protective measures, please refer to encrypting your online footprint. Although it cannot completely ensure information security, it seems that getting all your information will require some effort.
Actually, what I've said are all basic things. The Gray Pigeon software created by Ge Jun from Fearless's hometown can completely control your computer without you realizing it, causing a great stir across the entire network. There are many such softwares, not just one. Flexispy can partially control and monitor your mobile phone. No matter where you are, as long as your phone is on and has a signal, the domestic version is called "X Undercover."
Information security? Dream on! We need to know what kind of world we live in now. So I have always been advocating for naturism. Screw it, let's not even wear clothes!