1比1现金棋牌

Home > Media Convergence

Photo leak location attracts attention APP collects information to protect users' right to know

Time: 2019-12-19 Source: People's Network

Original title: APP collects information to protect users' right to know

Recently, the topic of sending original pictures or leaking location information on WeChat has attracted public attention and heated discussion.

The Tencent WeChat team responded that today, any photos taken by smartphones contain Exif parameters, which can call GPS global positioning system data and record location, time and other information in the photos. Whether the original image is sent by WeChat, SMS, email, or other transmission tools, the accompanying information will be sent together. However, the photos sent by the circle of friends are automatically compressed by the system without location and other information. If you are really worried, you can avoid sending the original image or turning off the positioning. There is another trick, P will be reissued after the map.

"Sending the original image leaked shooting location requires 3 conditions to be met at the same time: the mobile phone GPS positioning is turned on; the camera is set to save the geographic location; the original image is sent." Said Zheng Ning, deputy director of the Law Department of Communication University of China.

Original image contains location information

Easy to cause privacy leaks

If you turn on the GPS of your mobile phone and set the save location when taking photos, what information can you see on the photos?

In response, a reporter from the Legal Daily conducted a test.

When you download the original image taken by your mobile phone to your computer and open it, you can see the detailed latitude and longitude in "Picture Information", and this latitude and longitude can be accurately located to a specific location through map retrieval; when you view the original image information directly through your mobile phone, open For the original image, click "Detailed Information" to accurately display the photo location, phone model, and shooting time. If it is not the original picture or the mobile phone positioning is not turned on when shooting, you cannot view the location information.

"Originally, the original image contains so much information, and I dare not send original images to unfamiliar people in the future." Liu Xin (a pseudonym), a senior girl at a university in Beijing, said that in the era of big data, even without the original image, There are other ways to leak privacy.

Liu Xin said that in fact, don't worry too much about selfies. After all, the photos sent to the circle of friends have been processed, mainly for some study or work requirements, and need to pass information to some people. Sometimes they are sent for convenience. Original image. "I still feel a little scared when I want to come. I feel that I have no privacy. The time of taking pictures and location information are exposed to others."

Zheng Ning explained that the original image leaked by WeChat was referring to the Exif data in the photo. Exif can exchange image file formats. It is specifically set for digital camera photos. It can record the attribute information and shooting data of digital photos, which is equivalent to the identity information of pictures. However, Exif information is easy to modify and destroy. For example, if a picture taken by a camera is saved and compressed again after opening, Exif information may be lost a large part.

"It is best not to leak the original image taken by the mobile phone, because once this information is leaked, it may be speculated about the details of the person who posted the photo, such as the occupation, economic status, family situation, etc. If this information is obtained by criminals, then the photo holding Someone is very likely to be the target of fraud, causing personal or property damage. "Zheng Ning said.

According to Zhu Wei, a researcher at the Center for Communication Law of China University of Political Science and Law, many photos of users, even if the original image is sent, contain location information, not all geographic information is meaningful. However, if location information is closely related to personal private life, it may be useful. Direct usability, then it is possible to identify personally identifiable information, which poses the risk of privacy leakage. However, this issue can be controlled by the user.

"Some of the information in the photo is for commercial use. Using the information such as the geographical location of the photo can accurately recommend some advertisements or information. If it is used by criminals, it may also be used for fraud." Zhu Wei said.

Turn off location protection for privacy

Gather information must be legal

Original photos are commonly used at the moment, and many people do not understand that the original photos will contain some information such as location and time. So is sending the original image a leak?

In response, Zhu Wei bluntly stated that in accordance with Article 12 of the 2014 Supreme People ’s Court ’s Judicial Interpretation of Internet Infringement of Personal Rights, the information sent by the original picture is a channel that is legitimate, and others have also seen through legal channels, and The parties sent their own steps. Therefore, personally sending photos is not a disclosure of information.

"If the combination of personal information and personal behavior trajectory may be regarded as the scope of privacy protection, but this is not the core sensitive information." Zhu Wei said.

What if I do n’t want others to know about the information contained in the photo?

Zheng Ning suggested that if you do not want the photos to have location information, you can turn off camera positioning to solve the problem from the root cause. If you want to remove this information after taking a photo, you can use professional tools to erase the information with one click. Such apps can be downloaded in many app stores. In addition, you can use the native Windows functions on your computer to remove this information and open the image file. After "Properties", find "Detailed Information", you can see the words "Delete Attributes and Personal Information" in the lower left corner of the window. Click to perform the Exif delete operation. This operation can either delete the Exif of the source file directly, or generate a delete. Image file after Exif.

"The topic of the original picture aroused widespread concern also aroused the awareness of network operators and program developers." Zheng Ning said that mobile phones will collect personal location information when taking pictures. For this collection, users have the right to know and choose. That is to choose by authorizing the camera's positioning function, but many users may not know that once authorized, the photo will automatically record the location information when taking a picture. Therefore, when the software is authorized, the user should be clearly informed about the consequences of the authorization and the information will be used. Where to protect the user's right to know and choose, the camera program should facilitate the user to decide whether to record information such as location by adding convenient switches.

According to Article 41 of the Cyber Security Law, the collection and use of personal information by network operators shall follow the principles of lawfulness, justification, and necessaryness, publicize the rules of collection and use, and clearly state the purpose, method, and scope of the collection and use of information. Collected consent. Network operators must not collect personal information that is not related to the services they provide, must not collect and use personal information in violation of laws, administrative regulations and the agreement of both parties, and should handle their storage in accordance with the laws and administrative regulations and the agreement with users. Personal information.

"Before, the 2018 national standard" Personal Information Security Regulations "also gave three measures for the collection of personal information, namely, the direct association, minimum frequency, and minimum number of relationships between the collection of personal information and the realization of business functions of products or services. "Zheng Ning said.

Timely exercise of the right to cancel

Strengthen personal privacy management

Zhu Wei analyzed that personal information includes sensitive information, behavioral information, identifiable information, non-identifiable information, and even big data, intellectual property rights, etc., which covers a wide range of content. Users should protect their information. Here are the principles: first, do n’t download some apps at will; second, do n’t authorize all your content to platforms you do n’t understand; third, perform the right to log out in time and delete the account information content through logout; Fourth, the police should promptly report any problems. Fifth, don't click the links sent by people you don't know.

In Zheng Ning's view, users should raise awareness of media literacy and privacy protection, and strengthen personal privacy management.

Zheng Ning said, "In terms of website use, do not register unreliable websites. These websites have a weak protection of personal information and are easy to be attacked and lead to information leakage. Some ulterior websites exist for collecting user information. The sale of personal information is profitable; in terms of app use, try to choose the official channel, do not download the cottage app of unknown origin, and be careful to grant the app 'open the camera and microphone `` read text messages'' read contacts `` read location information '' Check permissions for apps that use a lot of traffic without notification. Do n’t set QQ, WeChat, Weibo, etc. in your phone to 'Auto login'. Passwords should be changed regularly. When you no longer use the App, you should Quit completely. Turn off some apps ’self-starting functions and uninstall them if you ca n’t turn them off. In the use of public free WiFi, set the automatic connection WiFi to manual to avoid falling into hacking traps. When connecting to free WiFi, avoid operations involving passwords or transfers. And other sensitive businesses. "(Reporter Han Dandong Intern Lin Yinting)


Editor-in-chief: Wang Diantong

更多 Recommend more
  • Beijing Winter Olympic Games Event Name Released

  • The International Olympic Committee pays close attention to Beijing

  • Shaanxi Ruins Found 4,500 Years Ago

  • Expert: It's too early for AI to replace human warfare

  • The three support teachers applied for the extension only because the children said, "Teacher, don't leave us"