Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 3|回復: 0

In defense of personal

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-11-7 14:43:05 | 顯示全部樓層 |閱讀模式
In conditions where the possibilities of borrowing from outside are limited, of course, it is necessary to look for ways to create our own information technologies and solutions.

But people cannot be made to be silent observers of the use and dissemination of their personal information.

By enriching anonymized information about movements, medical, fiscal data, information about services received, video and film viewing history, it is possible to obtain digital profiles of a person that will turn our understanding of privacy, private life and family secrets upside down.

Our personal data itself is of interest to many, but not all of them have good intentions.

There are authorities that content writing service provide public services and are involved in planning the development of cities. The public value of using data here is usually not in question, so the laws, as a rule, directly state what these organizations do.



There are commercial organizations that need our data to better understand our interests and offer us more relevant services, products, or website content. In these cases, the public value of using such sensitive information is not always clear.

We have all encountered annoying calls or SMS messages advertising services we don’t need. Therefore,

Today the law states that such use of data must occur with your consent

And finally, there is the outright illegal use of our data. We are talking about Internet probing services. About scammers who use data to achieve their goals from the victim by means of suggestion, manipulation and other psychological techniques - to force them to transfer money, commit an offense, put a person into a state of stress and panic.

A TOOL IN THE HANDS OF FRAUDSTERS

One example is when an employee is written to in a messenger on behalf of the head of the organization that a person in uniform will contact him and that his instructions must be followed. The messenger account looks like a real one - a photo, a phone number, information about the organizational structure of the organization, etc. is used.

This is facilitated, of course, by the large amount of data that has become publicly available since the beginning of the Special Military Operation. It is difficult not to see the hand of our opponents here. However, they do not particularly hide it.

They steal everything they can get their hands on. Most data leaks contain identifiers – name, phone, address, etc. Few leaks contain transactional information, which characterizes us much better than that name and phone.

回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|zv

GMT+8, 2024-11-23 09:48 , Processed in 0.034912 second(s), 18 queries .

抗攻擊 by GameHost X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |