Talk about privacy

Andre 2022-03-25 09:01:10

After watching the movie, although the female protagonist, the male protagonist accounted for more than half of the dialogue. The plot is a little off-putting, but it feels very realistic. .

In the show, Circle software rules the world, manipulating everything (including voting). The data is all in the cloud, and the high-level can use it to do whatever they want.
In reality, WeChat, Taobao, various clouds (Baidu Cloud, Apple Cloud, etc.), various monitoring, etc., we have no privacy at all.

1. Let’s talk about WeChat first.
Toutiao read an article saying that the circle of friends was "Why do people with low education always like to make voices?" "Swipe the screen. Whether this proposition is right or wrong. Speaking of privacy, a person in the circle of friends will collect all your voices, and then put them together. Pretend to be you and send voice scams to your friends or relatives. Text scams are very common, voice, and even video, many people will easily believe. . . . Baidu has searched countless WeChat voice scams. Of course, there are all kinds of social software.

2. Talk about Taobao.
The recent news is about Jack Ma's unmanned supermarket, China's four new inventions (foreigners named online shopping, together with high-speed rail, Alipay and shared bicycles as the "four new inventions" of contemporary China). The rapid development of technology has brought us a lot of convenience, but the problem of privacy or personal information is becoming more and more serious.
I remember a few years ago when I searched for something on Taobao on my mobile phone, and then I found that the computer web page advertisements will be this thing in the next month. After thinking about it, I thought it was hacked. After I checked, many people had the same problem. Gradually get used to it. (Mind the plot of your search for an inflatable doll and the parents found such an advertisement)
In fact, we have long lost any privacy rights online, and what big data has collected our online activities.
Just like Jack Ma said in a speech a while ago that he knows where girls have the smallest breasts. Jack Ma: Do you know which province has the smallest breasts in the country?
Taobao collects user preferences, in fact, think about it. If Taobao data is leaked or used by high-level executives like in the movie (in fact, the person who swiped has bought a lot of personal information of Taobao buyers and swiped countless orders). . Such incidents are endless.

3. Various cloud services
Baidu Cloud has recently leaked a lot of personal photos and privacy.Baidu network disk leaks privacy? Even the government address book was leaked . Apple also has backups in the cloud. The advantage is not to say, the disadvantage is that the cloud leaks.
Any cloud service is equivalent to everyone telling one person their privacy secrets. And this person is paralyzed, all secrets will be leaked. They all say how safe it is. In fact, Baidu, NetEase, and Sohu have all leaked it.
4. Shared
charging, watching videos, as long as the data cable is plugged in, all your mobile phone photos will be stolen. So it is still prudent to share charging outside.
Shared WIFI, especially passwordless. It's 3.15 this year, it's been revealed in the field test, and it's terrifying. . Connected, the mobile phone information is immediately transparent. .
Thought that sharing is free, there are actually many pitfalls. So still less greedy.
5. Others
include the leakage of the guest registration information of Home Inns in the past, and of course the leakage of Guodaimen.
Telecom scams have never stopped. Many scammers know their personal information, mobile phone numbers, how many children, how much they have deposited, what job title, what car, and what community they bought in the bank. . Targeted fraud. .

Having said so much, in a word, as long as you go online, as long as you shop online, use your mobile phone or computer. . Your personal information is already transparent. There is no privacy.

In fact, we are not afraid of personal information leakage. Because we will inevitably use it. But I am afraid of being used by some bad people. I remember that I used to set up a mobile phone number and never received spam messages. Then I went to another place to recharge and register, and then I received advertisements every day. .
A comment earlier said that we have no privacy, because our personal information may be well known by relatives and friends around us, and you don’t think it is privacy. But once it is known and used by strangers, do you still think it is not privacy? . If you are targeted by bad people, you will be slaughtered on the Internet, and you will have all kinds of information. .

The heroine has been a transparent person for a long time, thinking of Jim Carrey's "The Truman World". He is also transparent. The two are similar, the difference is that one is known to be public and the other is public. Truman is actually more tragic. We are as transparent as Truman on the Internet. Human nature or this society has not yet developed to a higher stage, and it is completely transparent, and no one can accept it. .

Finally, I would like to remind that my country's information protection laws are not perfect, and so many information leaks have finally come to an end. Countless people are deceived online every day, but few are caught on file. Therefore, individuals still usually pay more attention to the protection of their own and their family's information.

View more about The Circle reviews

Extended Reading

The Circle quotes

  • Eamon Bailey: We're so fucked.

  • [last lines]

    Mae: Hello.