Ant Group Invests Millions Again: Focusing on Green Computing and Privacy Computing, Building a Smart Future Together
Ant Group Invests Millions Again: Focusing on Green Computing and Privacy Computing, Building a Smart Future TogetherAt the three-day China Computer Conference CNCC2024, Ant Group announced continued funding for research development, launching the third phase of the "CCF-Ant Group Research Fund" with two research themes focusing on green computing and privacy computing. The release of this fund highlights Ant Group's determination to drive technological advancement and sustainable social development, as well as its vision of collaborating closely with academia to build a smart future together...
The Tencent Office Intimacy Video Scandal: A Double Test of Privacy and Workplace Norms
The Tencent Office Intimacy Video Scandal: A Double Test of Privacy and Workplace Norms Recently, a video suspected to be of Tencent employees engaging in intimacy in the office has sparked heated debate online. The incident quickly fermented, leading to public discussions about privacy protection and workplace norms...
Apple Opens Up NFC: A Balancing Act Between User Convenience and Privacy
Apple Opens Up NFC: A Balancing Act Between User Convenience and PrivacyApple's decision to finally open up NFC functionality in the upcoming iPhone 16, while seemingly offering users more choice, harbors potential privacy risks. As a veteran tech journalist, I've always been attentive to the impact of smartphone technology on user privacy...
The "X-ray Eyes" of Security Scanners: A Balancing Act Between Security and Privacy
The "X-ray Eyes" of Security Scanners: A Balancing Act Between Security and Privacy"Stop, there's something wrong with your luggage." The security officer said to a female passenger...
Is Deactivating Your Phone Number Equivalent to Selling Yourself? How to Protect Your Assets & Privacy?
Is Deactivating Your Phone Number Equivalent to Selling Yourself? How to Protect Your Assets & Privacy?In today's technologically advanced society, it feels like we live in a "transparent" world. However, seemingly insignificant details in our daily lives can put us at risk...
The Double-Edged Sword of Technological Convenience: Mobile Location Data Collection and Privacy
The Double-Edged Sword of Technological Convenience: Mobile Location Data Collection and PrivacyIn todays rapidly evolving technological landscape, our lives have become increasingly convenient, with mobile phones now an indispensable part of our daily routines. However, this convenience often comes with inherent privacy and security risks...
Mobile Privacy Leaks: How Black Markets Steal Your Phone Number?
Mobile Privacy Leaks: How Black Markets Steal Your Phone Number?In the digital age, we seem to be surrounded by information everywhere, and mobile phones have become an indispensable part of our lives. However, there are some concerns, namely the issue of mobile privacy leaks...
How can female astronauts meet their daily needs in space? How to protect privacy? Own tricks
Women can hold up half of the skyThe rise of women has never been just a talk. Over time, in addition to men, the aerospace industry has also seen the presence of women...
Do you know that your phone is being monitored by big data? Don't want privacy leaks? Teach you to turn off the monitoring switch
In this era of big data, mobile phones have become the most crucial tool for people to access information, but this tool is inseparable from us,They are constantly monitoring us.Everyone must have encountered it before, and casually said, "It's cooling down, I want to buy some autumn jackets...
Spreading others' privacy, inciting online violence, convicted and sentenced
Case Garden Case: Li Yan (pseudonym) is an online anchor. From January to May 2019, Liu Hong (pseudonym) and Li Yan had an emotional dispute...
Murena2 is a privacy conscious phone with two physical switches
Nowadays, many mobile phones consider privacy protection as one of their selling points. According to reports from Liliputing and eFoundation, Murena's Murena2 seems to be doing more thoroughly in this regard, with the primary goal of protecting user privacy in both hardware and software design...
Is the file transfer assistant a real person? Netizens panicked: Privacy has been posted! WeChat response
Recently, some netizens posted an article stating thatThe WeChat file transfer assistant is a personRaise attentionIn a screenshot provided by the @ Tencent WeChat teamA netizen suggested thatActually...