The system software and application software of smart phones are almost all rogue software, and there are hooliganism?
In fact, all smartphones are like this. The gray income of smart phones mainly depends on these rogue software. The reason why these softwares are free and can survive is also based on this rogue behavior.
All kinds of software in the computer are monitored by other security software, so it is easy for us to judge the choice and uninstall or install it. However, because the security identification of the software is not obvious enough, the smart phone itself cannot be easily judged and selected.
Rogue software in mobile phones, including input methods, browsers, address books, etc. , all involve hooliganism. These rogue behaviors mainly include: booting, unable to turn off, automatically turning on after turning off, building advertisements, downloading advertisements, sending advertisements, reading short message contents and mobile phone numbers, reading address books, reading pictures, reading mobile phone files, sending short messages, making phone calls, reading positioning information, automatically downloading, automatically uploading information and files, and sending. This kind of hooliganism is rare in general mobile phones, but it exists in almost every software in smart phones.
Civilized software is mainly used to obtain device information (i.e. mobile phone device identification code) and location information (i.e. location information), such as software developed by regular software providers such as grenades (mobile phone thunder), thunder watches, Baidu video, QQ and Sohu News. Of course, such as WeChat, mobile phone housekeeper, Fetion, Mi Chat, Mo Mo and so on. Because of the need of the software itself, it involves a lot of hooliganism. Of course, these access rights will be changed as needed after the phone is jailbroken.
Other kinds of software have hooliganism, which has nothing to do with the use function of the software itself, but it is going on. For example, in ink weather, you can send text messages, visit contacts, and read call records, including contact numbers and call duration. There is also ink weather, a look at the name, is a weather report software. These hooligans have nothing to do with reporting the weather. Another example is the sogou input method. Similarly, you can also visit contacts, read short message records including short message content and mobile phone number, and read call records including contact number and duration. This has nothing to do with the input function of the input method itself, but it is going on. Another example is reading from the starting point. You can send short messages and read short message records including short message content and mobile phone number, but this has nothing to do with the reading function of e-book software itself, but it exists. The same is true of most other software.
However, these hooliganism phenomena exist in a large number of smart phones. The so-called smart phone is actually a thief who steals personal privacy and business information. More often, smart phones are cheating, cheating with software developers and using some functions of smart phones as bait.
Now there is only a mobile phone, newly bought, with a lot of built-in software, many of which are useless, can't be uninstalled and can't be changed. They can only be installed, not uninstalled. In fact, they earn money from software developers through mobile phone users, and it is mobile phone users who are cheated. In addition to stealing personal privacy and business information, rogue software also has a great harm, that is, running a large number of software at the same time in the normal boot state leads to slow response of the mobile phone, which may lead to the phone crashing, jamming and shutdown, and at the same time cause the phone to waste electricity and lack of electricity, which affects the normal use of the mobile phone.
In order to change this rogue behavior, we must transform and improve the mobile phone, commonly known as: jailbreak, root, unlock, brush machine and so on. , are some behaviors that change the content of mobile phones.
Unlock, hence the name, and lift the lock restriction on the mobile phone. After that, you can root or escape from prison, or brush your computer. Prison break and root are to improve the authority of mobile phone operation. Like computer users, improving the level and scope of operation will not change the content and system of mobile phones. To put it simply, the mobile phone is to reinstall the mobile phone content such as system and software according to your own needs, which is wider than root and jailbreak, and the content of changes is wider. Commonly used software such as root, jailbreak and brush machine, such as Zhuo Dashi, one-click brush machine, brush machine master, etc.
Replace rogue software, you can jailbreak or uninstall after root, and you can also change the access rights of rogue software through the operation of security software, such as 360 security guard mobile version, mobile phone housekeeper and so on. This is a common and relatively simple solution to deal with rogue software hooliganism.
Smartphone, when will you stop being an accomplice and ally of rogue software?