In early 2016, the FBI hoped that Apple would develop software to unlock a suspect’s iPhone. The owner of the aircraft, Syed Farook, carried out a terrorist attack in San Bernardino, California, which killed 14 people a few weeks ago.
Suspect’s iCloud account,
Apple helped the FBI extract data from the suspect’s iCloud account, but some data is still unavailable. Because the phone password is not known, the FBI cannot open the phone either.
On February 16, 2016, the U.S. Justice of the Peace Sheri Pym ordered Apple to develop backdoor software for the FBI. The order was rejected by Apple. Cook believes that the order will threaten the safety of all iPhone users. Said that bypassing the iPhone password means creating a backdoor in its iOS system, and it can also be used to spy on all other iPhones.
Because of this incident, the public began to realize how much Apple insisted on user privacy.
At the beginning of last year, Cook published a column in Time magazine, calling on the U.S. Congress to pass comprehensive federal privacy legislation to allow consumers to defend their privacy rights more effectively.
In that article, Cook said that consumers should have the ability to freely and conveniently delete their data in service providers as needed. He also lashed out at the “shadow economy” of data brokers: and those who track users and collect data. Their data is then sold to profit-making companies.
There are always countless coincidences in life that make you feel like you are being monitored by your mobile phone.
Your work, income, address… The disclosure of these privacy not only determines the advertisements you see, but also determines the price displayed on the website when you shop, and may even be packaged and sold to make money.
In the middle of last year, we made a video called ” How your privacy is stripped by mobile phones “, which mentioned how advertisers can obtain your privacy through clipboard/album/Wi-Fi/cross-applications and websites, etc. , To push ads to you.
One of the more “bad” ones is cross-application tracking. To put it simply, the entire tracking process is similar to a web page. The App will give each user a unique device identifier (OAID for Android platform/IDFA for iOS), and then record your subsequent operations.
Apple disabled UDID,
After Apple disabled UDID, some applications were designed to bypass system restrictions. The user’s identity will be identified through the keychain. That is, in addition to the account and password, the application will also enter a string of special codes in the keychain, and when you read this string of codes, you can know who the user is.
Advertising tracking is usually an application borrowing a third-party program, such as monitoring APP channel exposure, clicks, activation and subsequent retention through Umeng statistics.
What can do Developers?
Developers can track the browsing/purchasing behavior of mobile phone users after using the software package provided by the third party.
However, the developers themselves do not know what kind of information the third-party platform will collect, and the third-party is likely to collect all the data that can be obtained.
Including but not limited to-email address, phone number, IP address and user’s location. It may also use the “Background Application Refresh” function to transfer data to the cloud when it is not turned on.
It is this cross-app advertising tracking that takes you as this, which has caused a large number of terrorist incidents disguised as coincidences. Products you find in a shopping app or search engine will be accurately pushed to you in the next app.
Last night, Apple updated the “Personal Data Day” page and added an explanation of the “App Tracking Transparency” (App Tracking Transparency, referred to as ATT) function, including the new feature of App Tracking License.
This feature allows users to choose when or whether to allow applications to track or share personal data across platforms. When a user opens an app for the first time, the device will pop up a window to remind you: In order to provide you with more accurate advertising services, are apps allowed to track user activities across platforms?
In addition, Apple has also added a “tracking” option in the system “Settings-Privacy”. In this setting, the user can see which apps have been allowed to track, so as to adjust according to their own situation.
What’s interesting is that in the selection menu, Apple puts tracking rejection on the top of allowed. Obviously, most users will reject advertisers’ cross-app tracking behavior through this feature.
Such an operation is a good thing for users, but for advertisers, when a large number of users refuse cross-app tracking, the impact is not only on the “precise delivery” of advertisements, but also affects advertisers’ evaluation of advertising effects.
Apple and Social Media,
There is no doubt that Apple has offended some Internet giants, those who rely on providing free services to attract users,
and then rely on advertising to make money. For example, foreign Facebook, and domestic Tencent and ByteDance.
In mid-March, according to a report by the British Financial Times, Apple warned Tencent and ByteDance not to try to bypass the upcoming application tracking transparency privacy function,
otherwise the application will be taken down.
Zuckerberg used a very long logic in his appeal: Apple prohibits ad tracking,
small developers can’t get ads, small developers can only pay for their own software, and consumers don’t trust small developers so much.
People don’t like paid subscriptions, and small developers can’t survive.
It looks just and reasonable, but it looks like a set of sophistry.
Many people have seen Three Body, and there is a dark forest theory well compiled. For the Trisolarans, the most powerful weapon of mankind is lies.
Correspondingly, the most precious resource of mankind is privacy. The need for privacy is actually engraved in human genes.
This matter has started since our African ancestors climbed down from the tree, and on the way home, the beast could not find out where he was staying.
Losing privacy means that you have to face-to-face with an attacker whose attack power is completely unequal, and accept dimensionality reduction attacks.
This dimensionality reduction blow means that in the eyes of the attacker, you are not a real person at all.
You are just a row of data with your personal characteristics.
Although advertisements are not necessarily useless, in a sense,
accurately recommended advertisements are indeed beneficial to increase life efficiency,
but what Apple does is to give privacy to users themselves and let users decide what private information they share.