Workflow
新型网暴“开盒”:警惕“数字时代的游街”
Zhong Guo Qing Nian Bao·2025-10-26 22:49

Core Viewpoint - The article discusses the emergence of a new form of online violence known as "opening boxes" (开盒), which involves the illegal gathering and exploitation of personal information, leading to harassment and threats against individuals [2][3]. Group 1: Nature of the "Opening Boxes" Phenomenon - "Opening boxes" is described as an upgraded version of "human flesh search," evolving into a mature black market where individuals can pay to access personal information [3]. - The process of "opening boxes" involves collecting and integrating information from various sources, with prices ranging from tens to hundreds of yuan depending on the information sought [3][4]. - The black market operates with clear divisions of labor, utilizing "black libraries" (黑库) for illegally obtained data and "white libraries" (白库) for publicly available information [4][5]. Group 2: Data Leakage and Exploitation - "Black libraries" consist of overseas databases that aggregate user data obtained through illegal means, while "white libraries" gather seemingly trivial information from social media that can be crucial for "opening boxes" [4][5]. - Many users unknowingly expose themselves to risks by using similar passwords across different platforms, making them vulnerable to "credential stuffing" attacks [4]. - The article highlights the ease with which personal information can be extracted from public posts, emphasizing the lack of awareness among users regarding the risks of data aggregation [5]. Group 3: Legal and Regulatory Challenges - The article notes that the participants in "opening boxes" are increasingly younger, with many cases involving minors, particularly in fan communities where emotions run high [6]. - Despite ongoing efforts to combat "opening boxes," victims often struggle to identify their attackers and face challenges in legal recourse due to the rapid spread of their information [6][7]. - The difficulty in establishing legal accountability for those who share harmful content complicates the enforcement of laws against online violence [7]. Group 4: Recommendations for Mitigation - Experts suggest implementing a classification system for digital identities, where sensitive accounts use the most secure information, while less critical accounts can use secondary identifiers [8][9]. - Victims are advised to collect evidence of online harassment promptly, including timestamps and details of the content shared, to support legal actions [9][10]. - The establishment of a cross-platform collaboration mechanism is recommended to enhance the effectiveness of combating "opening boxes" [7][8].