Foreign design black technology ring, can actually control personal privacy…

Recently, CCTV 315 evening party exposed several cases of invasion of users’ personal privacy. For example, stealing face information for customer analysis, selling personal resume, and stealing cell phone information by malicious App.

All kinds of phenomena are showing that every day in the era of big data “naked” we, privacy protection has become more difficult, and for the boundaries of privacy, our understanding seems to be only the tip of the iceberg.

In fact, there have been cases of personal privacy infringement, but the one that really caused widespread discussion in society was the Jitterbug app that grabbed users’ cell phone contacts around 2018, and until last July, there were still netizens posting on Zhihu questioning the invasion of users’ privacy by Jitterbug and other apps.

The netizen, who claimed to be a doctor of law, mentioned in the article that a large number of friends were recommended as “people you may know” after logging into the Jitterbug app. The use of his cell phone number to obtain personal information constitutes infringement. The court eventually ruled in favor of Ling Moumou, and asked ShakeYin to compensate for economic losses.

Also last year, a news “to protect personal information, wear a helmet to see the house” on the hot search. The news described that the sales office set up a face recognition system to identify whether the customer was a natural visitor or a channel to bring customers. When the final contract is signed, the face recognition data will be used as one of the bases for collecting commission, which leads to customers having to wear helmets to view properties.

Big Data Makes Privacy Leakage Easy

How exactly is it possible to leak privacy so easily? I believe we have all had the experience that when we mention a product on the phone or in WeChat, Taobao can immediately push the relevant product accurately.

At that Time, many people speculated that Taobao listened to the phone, but the truth is not true, the logic behind it is just big data analysis. Under the big data algorithm, you can make all kinds of APPs linked according to all the browsing records and time in your cell phone, and make recommendations of related preferred items. In front of the Internet, everyone has become transparent.

Not only does online privacy invasion proceed silently, but offline Life is also ambushed from ten sides.

Many people choose to install at the door, can automatically recognize the face, with a camera function of the visual doorbell. At the same time will also be recorded in the nearby neighbors’ access information, many people in the unaware when the Family situation is thus revealed.

In contemporary society, everyone is in danger of having their privacy exposed and sold at any time. Do we have to go to public places without internet access and wear helmets in the future? In this era of information flooding, privacy protection is a long way to go.

Privacy rings turn people into the Internet “invisible”

Compared to domestic privacy concerns only in recent years, foreign privacy protection is relatively sound. Amazon was once the creator of the Internet killing, but the subsequent outbreak of user protests made Amazon announce a permanent halt to this attempt.

But with the development of the Internet, foreigners have been hit again by privacy violations, and some old-fashioned and traditional people have even become a special group, refusing to use the Internet and smartphones and insisting on using traditional social methods, with the aim of becoming “invisible” on the Internet.

(There is a group of people called “Amish” in the United States, who reject all modern technology and prefer nature)

Not only the law is sound, the residents of high awareness, foreign countries are also keen to develop a variety of novel anti-privacy theft black technology, for example, the concept of the product called Me.Ring, is one of them.

All it takes is a flick of a switch on the ring. No one, from government agencies to advertisers everywhere, will be able to identify you with your face anymore.

That’s the concept of Me.Ring, an idea created by design firm Argodesign specifically to protect privacy.

After putting Me.Ring on your hand, you are an invisible person. When open to any occasion where data is to be collected (fingerprint recognition, facial recognition, etc.), turning it on will enable automatic shielding.

alt=

When you don’t want to use it, you can turn it off. The ring essentially helps you turn on stealth mode in real life, with the ability to permanently delete records and interrupt analysis of historical behavior.

“No matter where you live, this ring will be your key to social situations,” said Jenny Clark, associate director of Argodesign.

The Me.Ring app also allows you to make your own settings to share content such as contact data with professional networks and medical data with medical practitioners. These preferences can be customized by you when the ring switch is activated.

It is worth noting that it is not a stand-alone concept product and will require a very significant amount of government policy requirements and private company support in the software infrastructure that will support the device.

And, the device will not record your whereabouts, it will only act as your in-private data switcher and contact and data agent in your life. In other words, Me.Ring is still very feasible because it is smart enough to do so.

So what technology does Me.Ring work through? It’s actually quite simple behind the scenes. Through Bluetooth and other low-power wireless protocols, it can communicate not only with cell phones, but also with beacons in the environment (such as smart turnstiles, sidewalks, cameras and digital signage), and similar sensors are already installed in many cities.

It can be said that in an era when personal information is quite open under big data, this concept product, if developed smoothly and launched in mass production, will be of great significance to protect the security and privacy of ordinary people’s lives.

And until then, all we can do is to raise our own vigilance. Be careful to open cell phone permissions on APP. When you go online, choose the website data encryption transmission, block all kinds of pop-up ads, do not use public wireless in public places, enter the monitoring area to protect the facial features, such as wearing sunglasses, masks, etc.. It is best to have such an anti-snapshot device to help you find those subtle cameras in the dark.

All of the above is to raise a warning that we want to ensure their rights must be carefully screened. But at the same time, companies should understand that only the first to protect the interests of consumers, in order to win long-term benefits for the enterprise, do you think?