In early 2016, the FBI hoped that Apple would develop software to unlock a suspect’s iPhone. The owner of the aircraft, Syed Farook, carried out a terrorist attack in San Bernardino, California, which killed 14 people a few weeks ago.

Apple helped the FBI extract data from the suspect’s iCloud account, but some data is still unavailable. Because the phone password is not known, the FBI cannot open the phone either.

On February 16, 2016, U.S. Justice of the Peace Sheri Pym ordered Apple to develop backdoor software for the FBI. The order was rejected by Apple. Cook believes that the order will threaten the safety of all iPhone users. Said that bypassing the iPhone password means creating a backdoor in its iOS system, and it can also be used to spy on all other iPhones.

Because of this incident, the public began to realize how much Apple insisted on user privacy.

At the beginning of the previous year, Cook published a column in Time magazine, calling on the US Congress to pass comprehensive federal privacy legislation to allow consumers to defend their privacy rights more effectively.

In that article, Cook said that consumers should have the ability to delete their data in service providers as needed, freely, and conveniently. He also lashed out at the “shadow economy” of data brokers: and those through tracking Users, companies that collect their data and then sell the data for profit.

There are always countless coincidences in life that make you feel like you are being monitored by your mobile phone.

Your work, income, address…These privacy disclosures not only determine the advertisements you see, but also determine the prices displayed on the website when you shop, and they may even be packaged and sold to make money.

In the middle of last year, we made a video called “How Your Privacy Was Stripped by Mobile Phones”, which mentioned how advertisers use clipboard/album/Wi-Fi/cross-applicationAnd websites, etc. get your privacy and push ads to you.

One of the more “bad” ones is cross-application tracking. To put it simply, the entire tracking process is similar to a web page. The App will give each user a unique device identifier (OAID on Android/IDFA on iOS), and then record your subsequent operations.

After Apple disabled UDID, some applications were designed to bypass system restrictions. The user’s identity will be identified through the keychain. That is, in addition to the account and password, the application will also enter a string of special codes in the keychain, and when you read this string of codes, you can know who the user is.

Ad tracking is usually the application borrowing a third-party program, such as monitoring APP channel exposure, clicks, activation, and subsequent retention through Umeng statistics.

After developers use the software package provided by a third party, they can track the browsing/purchasing behavior of mobile phone users.

However, the developer does not know what kind of information the third-party platform will collect, and the third-party is likely to collect all the data that can be obtained.

Includes but is not limited to-email address, phone number, IP address, and user location. It may also use the “Background Application Refresh” function to transfer data to the cloud when it is not turned on.

It’s because of you that such cross-app advertising tracking has caused a large number of terrorist incidents disguised as coincidences. You are in a shopping app orThose are products found in search engines and will be accurately pushed to you in the next app.

Last night, Apple updated the “Personal Data Day” page and added an explanation of the “App Tracking Transparency” (App Tracking Transparency, referred to as ATT) function, including the new feature of App Tracking License.

This feature allows users to choose when or whether to allow applications to track or share personal data across platforms. When a user opens an app for the first time, the device will pop up a window to remind you: In order to provide you with more accurate advertising services, are apps allowed to track user activities across platforms?

In addition, Apple has also added a “Tracking” option in the system “Settings-Privacy”. In this setting, the user can see which apps have been allowed to track, so as to adjust according to their own situation.

Interestingly, in the selection menu, Apple puts tracking rejection above Allowed. Obviously, most users will reject advertisers’ cross-app tracking behavior through this feature.

Such an operation is a good thing for users, but for advertisers, when a large number of users refuse cross-app tracking, the impact is not only on the “precise delivery” of advertisements, but also affects advertisers’ evaluation of advertising effects .

There is no doubt that Apple has offended some Internet giants, those Internet giants who rely on providing free services to attract users, and then rely on advertising to make money. For example, foreign Facebook, and domestic Tencent and ByteDance.

In mid-March, according to a report by the Financial Times, Apple warned Tencent and ByteDance not to try to bypass the upcoming app tracking transparency and privacy function, otherwise the app will be taken down.

Zuckerberg used a very long logic in the appeal: Apple prohibits ad tracking, small developers can’t get ads, small developers can only pay for their own software, and consumers don’t trust small developers so much.Developers, consumers don’t like paid subscriptions, and small developers can’t survive.

It looks just and reasonable, but it looks like a set of sophistry.

Many people have seen Three Body, and there is a dark forest theory that is well compiled. For the Trisolarans, the most powerful weapon of mankind is lies. Correspondingly, the most precious resource of mankind is privacy. The need for privacy is actually engraved in human genes. This matter started when our African ancestors climbed down from the tree, and on the way home, the beast could not find out where he was staying.

Lost privacy means that you have to face-to-face with attackers whose attack power is completely unequal, and accept dimensionality reduction attacks. This dimensionality reduction blow means that in the eyes of the attacker, you are not a real person at all. You are just a row of data with your personal characteristics.

Although advertisements are not necessarily useless, in a sense, accurately recommended advertisements are indeed beneficial to increase life efficiency, but what Apple does is to give privacy to users and let users decide whether to share. What private information goes out.