(the WeChat public number TEEX trusted computing chain “)
The classic movie “Truman show” tells the story of the hero Truman was born from the beginning in 220 countries around the world are synchronous broadcast 24 hours of uninterrupted. Truman’s private life was a glance, exposed in the TV screen in front of him as “the world” only a don’t know your life is a drama that was chasing people. Truman’s “privacy” is a secret unknowingly.
1. we live in the world of big data Truman
Over the past 20 years, with the development of artificial intelligence, big data Internet everywhere, omniscient, together they created a “paradise” of the world, but this year the 315 party “AI telephone harassment” exposure makes us surprised to find themselves living in the same “Truman”, even a fan can those doors are not. A very thin Si fear is that AI just detonated harassing phone calls at the end of a ring, a most common telephone harassment is involved behind the installation of APP (Privacy interception), probe box (Privacy download), data analysis (Data Privacy) and AI voice telephone harassment (Privacy cash) a series of interlocking, high technology content of the black chain. In this era of big data, we do not have any personal privacy, leakage of personal privacy we also become the object of the telephone harassment bombing.
That our privacy is a step by step how to be leaked, these massive telephone harassment and why repeated?
How the 2. telephone marketing company to get your number
According to the 315 party exposure, the sound of dental science and technology limited company has developed a probe box when the user mobile phone wireless LAN in the open state, will send a signal for the wireless network to the surrounding, the probe box found after this signal can quickly recognize the user’s mobile phone MAC address. The sound of Dental Technology Co. Ltd. national 6 million users of information, including the information of all kinds of users and mobile phone numbers, as long as the matching MAC address and system background data to search, you can convert the user’s mobile phone number.
Collect near the user’s mobile phone number, dial telephone harassment, is one of the main functions, the probe box on the market, many companies have launched similar products. Bige technology 04-06 meow, Naokou information technology Naokou box, not only can collect user mobile phone number, you can even accurate portrait of the user.
3. with the probe box of big data, where it comes from
The probe box can get to the MAC address, the direct conversion of mobile phone hardware information and not for personal information, you need to upload data to the background, in-depth analysis of the MAC address of the use of big data matching algorithm, so as to get customers common APP, hobbies and other information. Then came the question of these large data ratio is come from it, in fact, some software mainly comes from mobile phone users to install, in order to use APP, users can only agree to obtain personal information such as the number, but in the case of the user’s knowledge, the information has become a number of enterprises a profit-making tool by real estate loans, education and training, and three party company, used to call telephone harassment for commercial marketing purposes.
315 party site to do a test, the host prepared a real social security information, and then through the “social security zhangshangtong” APP login first off the information, the experts through a computer in the next, will enter the host site of the information from all social security. “Social security zhangshangtong” APP, is not in fact the Social Security Bureau official launch of the query tool, without authorization, is actually the third party company provides high imitation products.
4. why repeated telephone harassment
Since July 2018, the organization to carry out a comprehensive renovation of a year and a half of telephone harassment special operations in the country, the 13 departments of the State Ministry of industry jointly issued “comprehensive remediation special action program” telephone harassment, but still repeated telephone harassment. As usual we call harassment is not a real man, but the robot. These robots through the study of artificial intelligence and intelligent voice tool, has been able to vividly imitate the human voice, and natural conversation with each other.
Is this 315 party named “a pigeon voice interactive system” is such a robot. This robot has higher efficiency than the traditional artificial customer service, a skilled artificial customer service the day most can hit more than 300 telephone harassment, and the robot can play every day 5000! According to the person in charge, they are more than a year, hit 4 billion this phone. Moreover, this technology will not leave any traces, did not check to call records, so as to avoid regulatory monitoring, law enforcement departments that are difficult to start.
5. privacy solutions help cut black chain data
Personal information in the process of acquisition, processing, sale and use, will inevitably fall into the hands of criminals, resulting in telecommunications fraud, blackmail and impose exactions on, fraudulent credit card, illegal debt collection and other criminal activities, such criminal activities once boarded the big data “ride”, the police hit the cost and difficulty will be doubled. The black data industry chain “strength” beyond our imagination.
The 315 party after the CNR also issued a real assessment of “protect the security of personal information, the data must be cut black chain.” Is committed to build a trusted computing resources and data services to the center, the privacy of the sharing platform is a pressing matter of the moment.
A distributed trusted computing platform, users, resources and service providers to build a complete ecosystem. Mainly based on the trusted execution environment (TEE), block chain, cryptography technology, Layer-2 provides solutions for the public privacy chain, aims to build a perfect ecological credible data.
We believe that privacy solutions can help cut black chain data, will help us get out of big data under the Truman show.
(more distributed trusted computing system knowledge please scan code plus our WeChat public number)