Workflow
隐私保护
icon
Search documents
网易云音乐明确没有“访客记录”功能
Xin Lang Cai Jing· 2025-08-25 23:33
Core Viewpoint - NetEase Cloud Music emphasizes that it does not have a "visitor record" feature, ensuring user privacy and data protection [1] Group 1 - NetEase Cloud Music clarifies that actions such as visiting user profiles or musician pages do not generate visitor records [1] - The platform prioritizes user privacy and adheres to the principles of "user awareness, user consent, and minimum necessity" in its privacy protection policies [1] - The company will not disclose any personal information without authorization [1]
京东:已为15万全职骑手缴纳五险一金,平台别一味规避劳动关系;小米卢伟冰:2027年进军欧洲汽车市场;字节跳动否认将推出手机产品
雷峰网· 2025-08-20 00:45
Group 1 - Li Xiang expressed deep gratitude to Wang Xing from Meituan, calling him the biggest benefactor in his entrepreneurial journey, especially during a critical financing period in 2019 when Meituan invested $300 million in Li Auto [4][5] - Meituan's stock price was struggling at the time of investment, but the decision to invest was pivotal for Li Auto's success [4][5] Group 2 - Meitu's revenue for the first half of 2025 reached 1.8 billion yuan, a year-on-year increase of 12.3%, with net profit rising 30.8% to nearly 400 million yuan, driven by AI-powered subscription services [8] - The company's stock price has surged nearly fivefold over the past year, indicating a strong recovery and market interest [8] Group 3 - JD.com has provided social insurance for over 150,000 full-time delivery riders since March 1, 2023, with an average monthly contribution of about 2,000 yuan per rider [9][10] - The company emphasizes the importance of formal labor contracts and benefits for riders, urging the industry to follow suit [9][10] Group 4 - ByteDance denied rumors of launching its own smartphone, focusing instead on providing AI capabilities to various hardware manufacturers [10][11] - The company previously acquired some patents from Smartisan Technology but has shifted its focus to educational hardware [11][12] Group 5 - Xiaomi reported a total revenue of 116 billion yuan for Q2 2025, a 30.5% year-on-year increase, with net profit rising 134.2% to 11.9 billion yuan [13] - The company plans to enter the European electric vehicle market by 2027, while also committing to not engage in price wars in its home appliance sector [13] Group 6 - Huawei's new Pura 80 series will feature a "Star Flash" car key function, enhancing vehicle access and security [16] - The technology aims to improve user experience by allowing smartphones to unlock vehicles with greater precision and speed [16] Group 7 - Anker Innovations is considering an IPO in Hong Kong, aiming to raise approximately $500 million, with plans already in motion [19][20] - The company's stock has risen over 50% this year, reflecting strong market performance [19][20] Group 8 - The mobile smart terminal ecosystem alliance, including OPPO, vivo, Xiaomi, Honor, and Lenovo, launched a privacy permission system to enhance data protection and user experience [21] - This initiative marks a significant step towards standardized privacy protection in the Android ecosystem [21] Group 9 - New Oriental Education's CEO was rumored to be under investigation, causing a significant drop in stock prices, which was later denied by the company [22] - The stock had previously reached a two-year high before the rumors surfaced, highlighting the volatility in the education sector [22] Group 10 - Apple’s official account on Xiaohongshu gained 170,000 followers within 24 hours of its launch, indicating strong engagement with the platform [24][25] - The penetration rate of iOS devices among Xiaohongshu users is nearly 50%, showcasing the platform's significance in the digital ecosystem [24][25]
美国情报总监:英国已放弃要求苹果(AAPL.US)提供加密数据“后门”
智通财经网· 2025-08-19 10:27
Core Viewpoint - The UK has agreed to abandon its proposal for Apple to create a "backdoor" to access encrypted data, following strong opposition from tech companies and privacy advocates [1] Group 1: UK Government Actions - In January, the UK issued a command under the Investigatory Powers Act requiring Apple to remove advanced encryption from user data stored in cloud services [1] - The UK government aimed to access data related to serious crime investigations, particularly concerning terrorism and child sexual abuse [1] - The initial command faced significant backlash from tech companies, privacy advocates, and legislators in both the UK and the US [1] Group 2: US Government Involvement - US officials, including Vice President Vance, intervened during a recent trip to the UK to facilitate the withdrawal of the command against Apple [1] - A mutually beneficial agreement was reportedly reached between the US and UK governments, leading to the UK’s decision to withdraw the secret directive against Apple [1] Group 3: Implications for Apple - Apple resisted the UK’s command, emphasizing the importance of user privacy and security [1] - The withdrawal of the directive is seen as a victory for privacy rights and a safeguard for user data protection [1]
小米荣耀等5家企业联合推出隐私权限体系
Xin Lang Ke Ji· 2025-08-18 14:46
Group 1 - The core viewpoint is that five companies, including OPPO, vivo, Xiaomi, Honor, and Lenovo, have jointly launched a privacy permission system to enhance data protection while improving user experience [1] - The initiative aims to optimize system privacy protection capabilities and upgrade system permission capabilities, using system controls instead of traditional permission authorization [1] - The new privacy permission system will support a dual-track data access mechanism, ensuring transparency and control over data authorization [1] Group 2 - The timeline for personal information protection work includes three phases: policy formation (2019-2021), normalization promotion (2022-2024), and deep implementation (2025 and beyond) [3] - The focus during the normalization promotion phase will be on mobile app compliance governance, with ongoing technical inspections and violation notifications [3] - The deep implementation phase will concentrate on key areas, industries, and scenarios to promote data collection and usage towards a "minimum necessary" direction [3] Group 3 - The privacy permission system will include features such as split storage permissions, improved location authorization requiring separate consent, and runtime permissions instead of installation-time permissions [5] - The system will also provide options for limited access during runtime, allowing for more granular control over data access [5]
手机关机也会被追踪?这是真事,但无需担心
3 6 Ke· 2025-08-18 04:06
Group 1 - The article emphasizes the importance of storytelling for niche brands to attract consumer attention in competitive industries like smartphones [1][6] - It highlights that leading brands dominate advanced technology components, leaving smaller manufacturers to rely on storytelling and concepts to survive [1][5] - The article critiques certain brands that market themselves as "eco-friendly" while using outdated hardware at high prices [3][5] Group 2 - A new smartphone from the brand "Unplugged" is introduced, which exemplifies the trend of high-priced, low-spec devices that rely on privacy protection narratives [6][11] - The specifications of the Unplugged phone include a MediaTek Dimensity 1200 chipset, 8GB RAM, 256GB storage, and a 108MP main camera, but it runs a custom AOSP system without Google services [8][9] - The phone is priced at $989 with a monthly subscription service of $12.99, raising concerns about its value proposition [11] Group 3 - The article discusses the phone's features, such as microSD card support for storage expansion and a unique circuit breaker design that claims to prevent monitoring while the phone is off [14][15] - It explains the concept of "incomplete shutdown" in smartphones, similar to the "fast startup" feature in computers, which can lead to battery drain even when the device is turned off [22][27] - The article concludes that while privacy concerns may be overstated, the issue of battery consumption due to incomplete shutdowns is a valid concern for users [27][25]
阿里小号要没了,又少一个保护隐私的盾牌
3 6 Ke· 2025-08-14 13:19
Core Viewpoint - The discontinuation of Alibaba's virtual phone service, Ali Xiaohao, has sparked significant backlash from users who value privacy over convenience, highlighting the challenges of user data protection in the digital age [1][5][9]. Group 1: Service Overview - Ali Xiaohao, launched in 2014, is a paid subscription service that provides privacy protection by allowing users to bind a virtual number to various platforms, forwarding messages to their real numbers [3][5]. - The service has gained popularity as a "privacy protection tool," but its discontinuation has created a massive inconvenience for users who now need to update their account information across multiple platforms [3][5]. Group 2: User Concerns - Users are particularly concerned about the implications of losing a service that shields them from spam and marketing messages, especially during high-traffic shopping events like Double 11 and 618 [5][9]. - The backlash is intensified by the fact that Ali Xiaohao is a paid service, indicating a dedicated user base that prioritizes privacy [5][9]. Group 3: Industry Context - The trend of using mobile numbers as primary identifiers for online accounts has become prevalent, driven by the need for real-name registration and enhanced security [6][7]. - However, this reliance on mobile numbers has led to increased risks of data breaches, as users are left vulnerable when their information is exposed [7][8]. Group 4: Implications of Discontinuation - The closure of Ali Xiaohao is part of a broader trend where similar services from other telecom operators have also been shut down due to misuse by malicious actors [9]. - The discontinuation raises questions about how users will protect themselves from spam and scams without such services, relying instead on the evolving algorithms of smartphone manufacturers [9].
创始人“V神”:以太坊的“下一个十年”是怎样的?
Hua Er Jie Jian Wen· 2025-08-14 03:14
Core Insights - Ethereum's co-founder Vitalik Buterin envisions Ethereum transitioning from a "World Computer" to a more concrete "World Ledger" over the next decade, ultimately entering a "maintenance mode" as technology matures [1][4][5] - The "barbell strategy" focuses on Layer 1 (L1) prioritizing security and decentralization, while Layer 2 (L2) caters to high-performance needs, isolating centralization pressures from L1 [1][6][4] - Vitalik expresses cautious optimism regarding the rise of ETH treasury companies, acknowledging their role in providing new capital entry points but warning about the risks of excessive leverage leading to market instability [4][5][6] Ethereum's Future Vision - The next decade will see Ethereum shift its focus to becoming a "World Ledger," with the metaphor that "if the ledger is a book, ETH is the ink" [4][5] - Privacy is emphasized as a core principle, advocating for it to be a default feature in all wallets rather than a niche offering [7][4] Reflection on the Past Decade - Ethereum's development has exceeded initial expectations, with significant events such as The DAO incident, the rise of NFTs, and the explosive growth of DeFi marking the past ten years [5][4] - Vitalik notes that the unexpected speed of zero-knowledge (ZK) technology development has opened new possibilities for Ethereum's future scalability [8][5] Layer 1 and Layer 2 Strategy - The barbell strategy delineates L1 as a trusted ledger while L2 serves as an efficient environment for various high-performance applications, ensuring the long-term health of the ecosystem [6][4] - L1 should maintain a balance of low latency for regular users, while L2 can cater to extreme low-latency needs like high-frequency trading [6][4] Privacy as a Fundamental Value - Privacy is highlighted as a fundamental aspect of the crypto ethos, with a push for it to be integrated into mainstream wallets rather than being relegated to specialized "privacy wallets" [7][4] - The Ethereum Foundation is reportedly working on making privacy a default feature in wallets, aiming for user-friendly options for private transactions [7][4] Relationship with Bitcoin - Vitalik provides a nuanced view of the relationship between Ethereum and Bitcoin, recognizing mutual respect among technical builders while acknowledging ideological differences [8][4] - The evolution of both ecosystems is seen as a parallel journey, with Ethereum entering its "teenage years" while Bitcoin is still maturing [8][4]
阿里小号APP下线,搞崩了无数网友的心态
3 6 Ke· 2025-08-11 04:09
这几天有个新闻,阿里小号要全面关停。 按顺序分批结束服务,原有号码回收,余额按订购价格退回,今年 10 月 31 号 APP 下线。 公告发布当天,程序员的聚集地 —— V2EX 论坛中的讨论多炸了。 " 天塌了 " ," 这也太搞人心态了 "," 我彻底心碎 " 。 如果你是第一次刷到阿里小号,看到这些留言,可能觉得这些人太浮夸,但对于那些一直使用这个 APP 的人来说,这样的评价却 恰如其分。 因为他们所有的社交平台可能都绑定在这个 " 小号 " 上。。。 阿里小号是阿里通信在 2014 年推出的 APP,最开始叫 " 亲心小号 " ,通过这个 APP 你可以获得不需要 SIM 卡的虚拟手机号。 它可以正常接打电话,收发短信,这样一来外卖、快递、叫车都能通过小号解决,给中介、销售之类的留电话也可以用,保证有 沟通方式,也避免恶意骚扰。 价格还特感人,618 做活动的时候买半年送半年,20 元 1 年,这跟白捡有啥区别? 早年间,还经常允许用户免费体验一个月。 在 2014 年前后,垃圾短信是社会上最热的话题之一。 每到节假日,商场促销,售楼、二手车、旅游、美容美发等广告短信铺天盖地而来。 其中还会混入些 ...
存款取款单笔超5万元,还要不要说明“来源”和“用途”?央行、证监会等三部门发文,口径有变
Mei Ri Jing Ji Xin Wen· 2025-08-10 07:40
Core Viewpoint - The People's Bank of China, the National Financial Regulatory Administration, and the China Securities Regulatory Commission have jointly released a draft regulation for public consultation regarding customer due diligence and the management of customer identity information and transaction records, with a focus on easing previous stringent cash transaction requirements [1][2]. Group 1: Regulatory Changes - The most notable change in the new regulation is the removal of the mandatory requirement for individuals to "understand and register the source or purpose of funds" for cash transactions exceeding 50,000 yuan, as stipulated in the 2022 version of the regulatory rules [2][4]. - Financial institutions are still required to conduct due diligence and register basic customer identity information for one-time transactions exceeding 50,000 yuan, including retaining copies of valid identification documents [2][4]. Group 2: Background and Controversy - The previous regulation, which mandated that financial institutions verify the source of funds for cash transactions over 50,000 yuan, sparked widespread public debate and concern regarding privacy and the complexity of transaction processes [3][4]. - The initial implementation of the 2022 regulation was postponed due to technical reasons, despite the fact that transactions over 50,000 yuan accounted for only about 2% of all cash transactions, indicating limited impact on most customers [4]. Group 3: Balancing Compliance and Customer Experience - Financial institutions face the challenge of balancing anti-money laundering due diligence requirements with customer experience and privacy protection [5]. - Experts suggest that banks can enhance customer experience by optimizing processes, applying digital tools to replace manual steps, and strictly protecting customer privacy by adhering to the principle of collecting only necessary information [5].
AI数字人辅助小程序功能版块设计分析
Sou Hu Cai Jing· 2025-08-06 08:00
Core Concept - The article discusses the development of AI digital assistants that enhance human-computer interaction by simulating human communication, aiming to provide natural and efficient service support in daily scenarios [1] Natural Language Interaction System - The dialogue interface utilizes multi-turn conversation technology, enabling context semantic understanding and intent recognition. Users can input requests via text or voice, with the system automatically correcting and completing key information [2] - The response module is designed to express human-like responses, matching emojis and tone words to the conversation content to avoid mechanical replies [2] Task Management and Scheduling - The digital assistant can parse complex user requests and break them down into executable steps. For example, if a user inputs "prepare for a weekend family gathering," the system generates a shopping list, venue setup suggestions, and a schedule [4] - The scheduling module synchronizes with the user's mobile calendar, setting reminders and detecting conflicts, automatically suggesting adjustments when overlapping events are detected [4] Preference Model and Service Recommendations - Based on historical dialogue data, the digital assistant can proactively push relevant services. For instance, if a user frequently inquires about fitness plans, the system will regularly send workout tutorials and dietary suggestions [5] - Recommended content spans various categories, including lifestyle services, learning resources, and entertainment activities, with each recommendation accompanied by a brief description and action entry [5] Multimodal Interaction Expansion - In addition to basic text interaction, the digital assistant supports simple gesture recognition and emotional feedback. Users can express satisfaction through a thumbs-up gesture, which the system records to enhance similar recommendations [6] - The visual presentation adopts a 2.5D cartoon style to avoid discomfort from excessive realism, maintaining a consistent hairstyle and outfit for brand recognition while reducing cognitive load [6] Privacy Protection and Permission Management - Dialogue data is secured with end-to-end encryption, allowing users to choose data retention periods. The permission settings page offers detailed control options, such as allowing calendar access while prohibiting contact list access [7] - Sensitive operations require secondary verification, such as entering a preset password or biometric information to modify schedule arrangements [7] Visual Standards and Adaptation Optimization - The interface design adheres to brand color standards, primarily using a light blue color scheme to create a technological feel. Key operation buttons are sized no less than 44px to ensure accurate touch response across different devices [8] - Animation frame rates are maintained above 30fps to prevent lag during interactions. Testing shows that optimized versions have reduced the error rate by 40% among elderly users [8] - Through the collaborative operation of these functional modules, the AI digital assistant can establish a complete link of "demand understanding - task breakdown - service push," balancing technical advancement with emotional value to provide users with an efficient and warm digital assistance experience [8]