Chapter 206: Anti big data app

"I am the president of the university (

"How about I make an anti-big data app?"

This thought really shocked Zheng Tianyu.

To make such a software is not easy, nor difficult.

Technically, it's actually fine.

It is only a few thousand or tens of thousands of yuan if it is developed and put on the application store, and some cloud servers are rented.

But what is rare is the follow-up expenses, how to operate for a long time...

For example, if such software is free without charge, once it is popularized, the more apps are installed, the more server space will be required.

And this kind of software must be running in the background when the phone is turned on, so its power consumption must be very large!

The above optimization is also a big problem.

Thinking of these questions, Zheng Tianyu wanted to back off a bit.

These are not something he can solve as a college student.

Zheng Tianyu gritted his teeth, and murmured erratically, "Then give up?"

"Ask Lao Zhang to see."

After thinking about it, he called Zhang Lei.

Because their home is not far from Ludao, the two also went back for the National Day.

As soon as the call was connected, Zhang Lei's careless voice came.

"Tianyu, what's the matter? Did you eat the moon cakes? The fried chicken is delicious, and the principal is so cool!"

Zheng Tianyu has a black line, this idiot knows how to eat.

"Old Zhang, have you noticed what happened recently with Xixi?"

"And Xixi?"

Zhang Lei was slightly taken aback and asked, "Look, why are you asking this?"

Don't you mean moon cakes? Why did he suddenly ask Bian Xixi.

Zheng Tianyu hesitated and said, "How about we develop an anti-big data app?"

Zhang Lei's eyes widened, and his voice revealed excitement, "Anti-big data? How do you say it?"

Zheng Tianyu directly expressed his thoughts.

It is not easy to develop a software, even if you have programming skills, you must pull people to do it together.

And Zhang Lei is one of his goals.

Although Zhang Lei's programming ability is not as good as his, at least he can help a little bit.

Just after Zhang Lei listened, he pondered for a while and said, "If you really want to do this, Tianyu, I have a suggestion."

Zheng Tianyu was also a little curious, and asked, "What? You said."

Zhang Lei expressed his thoughts: "I think you can ask the principal directly on WeChat. I think this idea is very good. If there is no support from the school, I think it is very difficult."

However, Zheng Tianyu fell into silence after hearing this.

Without Zhang Lei's reminder, he never thought that he could ask the school for help.

But... he also thought of the difficulty.

Zheng Tianyu replied in distress: "But if it is developed, it will be difficult for this software to be profitable, and it will continue to burn money."

Zhang Lei continued: "Do you think our principal is short of money? You care so much, let's communicate with the principal first."

"Well, it seems that too."

Zheng Tianyu's mouth twitched, thinking of the lavish appearance of the principal, it seems that Zhang Lei's words also make sense.

"Okay, then I'll ask later."

...

...

When Chen Hao received the news from Zheng Tianyu, he was a little surprised.

I thought I was here to ask about the results of the Mathematical Modeling Contest, but I didn't expect to click it, and I saw a question about big data.

The issue of information security has indeed become a major issue in the current era of rapid development of the Internet.

For example, the newly established first-level discipline cyberspace security major in recent years reflects that the country has begun to attach importance to cybersecurity issues and has begun to cultivate corresponding talents.

But in fact, most of these network security experts are to prevent the information security of enterprises.

As for the safety of users, it is of course necessary to prevent external intrusions.

You can collect users' private information at home...ahem, this is called commercial behavior, not voyeurism.

What Zheng Tianyu mentioned is only a small part.

All in all, it deserves praise and praise.

After thinking about it, Chen Hao sent two voices over.

9\'\': "Your idea is very good and worth doing, but what you think is a bit simple."

25\'\': "Privacy leaks are mainly divided into three types: active, passive, and malicious leaks. You are only guarding against passive privacy leaks, you know that the other two cannot be prevented at all?"

Active type means that we actively fill in some information in various applications, which is one of the most common ways to leak our personal information.

For example, hobbies, family members, work information, etc. filled in in some dating software and loan software.

The passive type is that the user records the user's behavior track in the search engine search for items, social software chat and other channels.

These will be recorded by big data, and then recommended everywhere. Of course, in fact, these behaviors of collecting information are incorrect, but generally they will not cause harm to users.

The malicious leak type is that some hackers use technical means to steal your computer's data, or steal most of the data in the database of other companies, and then sell it to other people in need.

Zheng Tianyu said: "I know, but I think at least doing something can help netizens."

Chen Hao asked, "But do you know what difficulties you are facing?"

This thing is not as simple as it seems.

Not to mention that software is secretly acquiring your private information, even major mobile phone brands are doing this.

Whether it is Huaxing or Apple, which one has a clean **** on this?

Everyone is collecting information from big data and reselling each other.

You are good, you want to come up to stop everyone's information collection?

Isn't this one enemy?

And is user information security really something you can prevent if you want to prevent it?

Mobile Internet + one machine per hand + real-name system = portraits.

Online shopping exposes your address and shopping habits.

Using navigation will reveal your daily whereabouts, and you can calculate your address and company address.

Dating sites will reveal your personal emotional situation, family situation.

...

These data can be added up to get your personal portrait data. Maybe these Internet companies know yourself better than you.

The Internet is everywhere, and all behaviors on the Internet are recorded, as if there are cameras monitoring you 24 hours a day, do you feel a chill in your back...

The Internet has entered the era of real names from an anonymous era, and will enter an era of anonymous demand in the future. After all, no one wants to have an eye behind their backs at all times.

This idea of ​​Zheng Tianyu attracted the interest of Chen Hao.

In the era of big data, software can collect big data.

But can you please collect it in the software? Out of the software, my chats, shopping, and calls are all being watched by you, which is too much.

Just because of the photonic screen, major mobile phone brands really dare not offend Guanghua University.

Not only does he have to support Zheng Tianyu in doing this, but he also has to come in and lead it himself!

As for the question of profitability... just make it for free!

He can burn money to enhance the reputation and social responsibility of Guanghua University!

"This anti-big data app is beneficial to society, and the school and I will strongly support you!"

ps: Ask for a recommended ticket and ask for a monthly pass!

Chapter 2 is finally here, alas.

Life is hard.