I Am the President of the University

Chapter 206 Anti-big data app

Latest website: "How about I make an anti-big data app?"

This idea really shocked Zheng Tianyu.

Making such a software is neither easy nor difficult.

Technically, it's actually no problem.

After developing it and putting it on the app store, it only costs a few thousand or tens of thousands of yuan to rent some cloud servers.

But the difficulty is the follow-up expenses and how to operate it in the long term...

For example, if such software is free and free, once it is promoted, the more apps are installed, the more server space will be required.

And this kind of software must be running in the background when the phone is turned on, so its power consumption must be very large!

The optimization above is also a big problem.

Thinking of these problems, Zheng Tianyu wanted to back down.

These are not things that a college student like him can solve.

Zheng Tianyu gritted his teeth and murmured with wandering eyes: "Then give up?"

"Ask Lao Zhang."

After thinking about it, he called Zhang Lei.

Since their home is not far from Ludao, the two went back during the National Day.

As soon as the call was connected, Zhang Lei's careless voice came.

"Tianyu, what's going on? By the way, have you eaten the mooncakes? The fried chicken is delicious, and the principal is so awesome!"

Zheng Tianyu has black hair, this idiot knows how to eat.

"Lao Zhang, have you noticed what happened recently?"

"Together Xixi?"

Zhang Lei was stunned for a moment and asked, "Look, why do you ask this?"

Aren't you talking about moon cakes? Why do you suddenly ask Xixi?

Zheng Tianyu hesitated and said, "What do you think we develop an anti-big data app?"

Zhang Lei's eyes widened, excitement in his voice, "Anti-big data? How do you say it?"

Zheng Tianyu expressed his thoughts directly.

Developing a software is not easy. Even if you have programming skills, you will definitely need to get people to work on it together.

And Zhang Lei is one of his targets.

Although Zhang Lei's programming ability is not as good as his, he can at least be able to help.

But after Zhang Lei listened, he thought for a while and said, "If Tianyu really wants to do this, I have a suggestion."

Zheng Tianyu was also a little curious and asked: "What? Tell me."

Zhang Lei expressed his thoughts: "I think you can ask the principal directly on WeChat. I think this is a good idea. If there is no support from the school, I think it will be quite difficult."

However, Zheng Tianyu fell into silence after hearing this.

Without Zhang Lei's reminder, he never thought that he could seek help from the school.

But...he also thought of the difficulty.

Zheng Tianyu replied distressedly: "But once it is developed, it will be difficult for this software to make a profit, and it will continue to burn money."

Zhang Lei continued: "Do you think our principal is short of money? You have so much to do, so let's communicate with the principal first."

"Well, it seems so."

Zheng Tianyu twitched the corner of his mouth, thinking of the principal's generous appearance, it seemed that Zhang Lei's words made sense.

"Okay, I'll ask later."

When Chen Hao received the news from Zheng Tianyu, he was a little surprised.

I thought I was here to ask about the results of the mathematical modeling competition, but when I clicked on it, I saw a question about big data.

Information security issues have indeed become a major issue in the current era of rapid development of the Internet.

For example, the newly established first-level discipline cyberspace security major in recent years shows that the country has begun to pay attention to network security issues and has begun to cultivate corresponding talents.

But in fact, most of these network security experts are preventing corporate information security.

As for user security, it is of course necessary to prevent outside intrusions.

But they can collect users' private information... Ahem, this is called business behavior, not voyeurism.

What Zheng Tianyu mentioned is only a very small part.

After all, it is worthy of praise and praise.

After thinking about it, Chen Hao sent two voice messages.

9'': "Your idea is good and worth doing, but you are a bit simplistic."

25'': "Privacy leakage is mainly divided into three types: active, passive and malicious leakage. What you are preventing is only passive privacy leakage. You know that the other two cannot be prevented at all?"

The active type means that we actively fill in some information in various applications. This is the most common way to leak our personal information.

For example, interests, hobbies, family members, work information, etc. filled in some dating software and loan software.

The passive type records the user's behavior trajectory through search engines, social software chats, etc.

These will be recorded by big data and then recommended everywhere. Of course, these information-gathering behaviors are actually incorrect, but they generally do not cause harm to users.

The malicious leak type is when some hackers use technical means to steal data from your computer, or steal most of the data from other companies' databases, and then sell it to other people in need.

Zheng Tianyu said: "I know, but I think at least doing something can help netizens."

Chen Hao asked: "But do you know what difficulties you will face?"

This matter is not as simple as it seems.

Not to mention that software is secretly obtaining your private information, even major mobile phone brands are doing this.

Whether it's Huaxing or Apple, which one has a clean butt?

Everyone is collecting information from big data and reselling it to each other.

You're welcome, but you want to stop everyone's information collection?

Isn’t this one against many?

And is user information security really something you can prevent if you want to?

Mobile Internet + one phone per person + real-name system = portrait.

Online shopping reveals your address and shopping habits.

Using navigation will reveal your daily whereabouts and can calculate your residential address and company address.

Dating websites will expose your personal emotional status and family situation.

The sum of these data can completely produce your personal portrait data. Maybe these Internet companies know you better than you do.

The Internet is everywhere, and everything you do online is recorded, as if there are cameras monitoring you 24 hours a day. Do you feel a chill down your back...

The Internet has entered an era of real names from an era of anonymity, and will enter an era of demand for anonymity in the future. After all, no one wants to have an eye staring behind them at any time.

Zheng Tianyu's idea attracted Chen Hao's interest.

In the era of big data, software can collect big data.

But can you please collect it within the software? Without the software, you can spy on me while chatting, shopping, and talking on the phone. This is too much.

Just because of the photon screen issue, major mobile phone brands really don’t dare to offend Guanghua University.

Not only did he want to support Zheng Tianyu in doing this, he also wanted to come in and take the lead himself!

As for the issue of profitability...just make it free!

He can spend money to improve Guanghua University’s reputation and social responsibility!

"This anti-big data app is beneficial to society, and the school and I will strongly support you!"

ps: Please give me recommendations and monthly votes!

Chapter 2 is finally here, alas.

Life is hard.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like