When WiFi Master Key quietly takes away your password, do you really not mind?

When WiFi Master Key quietly takes away your password, do you really not mind?

Many Internet companies or products , in the name of innovation, wantonly trample on moral red lines; in the name of sharing, they walk the line between legal and illegal.

[[251081]]

We all know that the biggest difference between the Internet era and the traditional era is that once data is made public, there is no room for recovery. In the real world, a product can be recalled if it has a problem, and if a privacy is seen by others, it will not cause much impact as long as it is controlled within a certain range. In the Internet era, once personal information is obtained by the Internet, it means that there is no privacy at all. So how is the right to privacy on the Internet defined?

Baidu Encyclopedia gives the following definition: Internet privacy is an extension of the right to privacy on the Internet. It refers to a personal right of natural persons to enjoy the tranquility of their private life, private information, private space and private activities online, which are protected by law and shall not be illegally invaded, known, collected, copied, used or disclosed by others. It also refers to the prohibition of disclosing certain sensitive personal information online, including facts, images and defamatory opinions.

[[251082]]

Let's analyze how your privacy is violated. WIFI***Key is a commonly used "freeloading" software. With the help of the software's own sharing function, the WIFI SSID (account) and password are uploaded to the cloud database. When the user searches for nearby SSIDs and passwords available in the cloud database, the user is prompted to unlock the WIFI password and choose whether to access the network. The private password is made public. Although only mobile phones with WIFI***Key software can access the Internet, it does not mean that it is not public. It should be noted that the number of users of WIFI***Key has exceeded 900 million, and the daily active users have exceeded 200 million, making it a highly active application software second only to WeChat and QQ.

We all care whether our private network can be invaded by others? Under what circumstances can we connect to the wireless network to surf the Internet? In layman's terms: either the accessor knows the account and password, or the owner tells it to you. When the WIFI owner does not authorize, all access can only be done by "peeping" to obtain the WIFI password. As early as March 29 this year, CCTV's "Economic Half Hour" column made a professional in-depth report on the WiFi***Key APP, revealing the various security risks it brings to users.

[[251083]]

Some people may say that the password of the WIFI key is shared by the owner. This is totally wrong! How do you know that the way I got the password is legal? If I am using someone else's network, but the software intercepts the password and shares it with more people, whose behavior should be condemned? Isn't it wrong to give someone else's things away? If it is defined as sharing, then you should also share your own things. In the real world, if a friend lends you a car, and you "share" the car with everyone, will your friend not be angry with you when he knows about this? It just happens when using WIFI, and this matter is not easy for the owner to notice.

Generally, for the convenience of memorization, WIFI owners usually set their WIFI passwords as a combination of name and birthday, which are often used as online banking and other platform account passwords. Such associations make the loss of WIFI passwords a huge security risk for individuals. Imagine, would you be willing to tell your guests or strangers the password of your home door lock? I think most people would not be willing to do so. Isn’t it the same for WIFI passwords?

[[251084]]

I have already talked about the sharing economy and the sharing economy in previous articles. They both have strict definitions. Not everything can be shared. We are all the masters of the times. "Everyone for me and I for everyone" is the choice of our times, but we must never share or share other people's privacy in the name of sharing. This in itself is an act of infringing on other people's privacy rights. At the very least, it violates morality and public conscience. At the worst, it violates laws and regulations and will be subject to criminal liability.

So how can we do it legally, in compliance with regulations and in line with ethics? First of all, we need to confirm whether the sharer is the owner of the WIFI . The guest's sharing behavior itself is a theft, which should not and cannot be encouraged by Internet products, otherwise the disseminator will become an accomplice. Secondly, it should be based on voluntary basis , that is, the owner voluntarily shares the WIIF resources for everyone to use, so the WIFI owner needs to take the initiative to share. For example, some public places such as restaurants make WIFI accounts and passwords public to facilitate everyone to order food and use. Thirdly, the sharer confirms that the sharing behavior will not bring new problems , and the platform also needs to assist the sharer in assessing the possible risks. If the sharing of WIFI brings data or other losses in the network, the sharer and the APP disseminator should bear legal responsibility. ***, the disseminator who shares the WIFI password has the obligation to inform all sharers of the sharing behavior , and must obtain confirmation from the sharer before sharing, and cannot do it secretly. Taking someone else's things and telling others is called "borrowing", and not telling others is "stealing".

[[251085]]

The Internet era is an era of sharing and sharing. Each of us, as sharers, users and beneficiaries, must be vigilant and protect our privacy rights from being violated. As sharers and communicators on various platforms, we should take the main responsibility for communication supervision and be a legal enterprise with conscience, morality and bottom line. The times require us to be vigilant and not let risky software quietly take away your password and quietly invade your privacy!

<<:  5G is here: Will 4G soon be relegated to the sidelines?

>>:  9 Ping Monitoring Tools Worth Paying Attention to for Network Administrators

Recommend

Development Trends and Prospects of Future Networks

[[375296]] Recently, Liu Yunjie, academician of t...

IPv6 Security Thinking: Risk Analysis of Recursive DNS in IPv6 Networks

DNS (Domain Name System) is an important core inf...

Aruba ESP Unveils New Enhancements to Secure Enterprises from Edge to Cloud

Aruba, a Hewlett Packard Enterprise (NYSE: HPE) c...

Facing the information gap brought by the 5G era

South Korea is expected to launch 5G (fifth-gener...

Forecast of China's Internet Market Development Trends in 2021

As the COVID-19 pandemic is gradually brought und...

The hidden threat of smart home privacy leakage comes from the router

In our daily life, we can use smartphones to cont...

Co-construction and sharing to protect and release the dividends of 5G

[[351365]] There has always been controversy in t...

What is the value of developing smart education? 5G and AI play a key role

As the domestic prevention and control situation ...