Tag

privacy protection

0 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Nov 9, 2024 · Information Security

How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy

Companies can monitor employee WeChat chats on corporate‑issued, rooted computers through network sniffing, OS‑level screen capture, and file‑watching tools, allowing them to view personal messages, infer app usage, and thus personal privacy on work devices is vulnerable, so users should avoid personal WeChat on such devices or use separate accounts and enterprise archiving features.

Mobile Securityemployee monitoringinformation security
0 likes · 5 min read
How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 15, 2024 · Mobile Development

Common Pitfalls and Solutions When Developing WeChat Mini Programs with UniApp (Vue 3 + TypeScript)

This guide summarizes the typical problems encountered while building a WeChat mini‑program with uniapp + Vue 3 + TypeScript—such as nickname input validation, custom navigation bars, custom tabbars, iOS safe‑area handling, list scrolling quirks, and privacy‑policy configuration—and provides concrete code‑level solutions and best‑practice recommendations.

TypeScriptVue3WeChat Mini Program
0 likes · 16 min read
Common Pitfalls and Solutions When Developing WeChat Mini Programs with UniApp (Vue 3 + TypeScript)
DataFunTalk
DataFunTalk
Apr 18, 2024 · Information Security

Kuaishou Big Data Security Platform: Architecture, Governance, and Practices

This article details Kuaishou's large‑scale data security platform, covering its background, architectural layers, authentication and permission models, full‑link audit, data classification and protection mechanisms, operational results, future road‑maps, and a Q&A session on practical challenges.

Big Data SecurityKuaishouaccess control
0 likes · 14 min read
Kuaishou Big Data Security Platform: Architecture, Governance, and Practices
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 2, 2024 · Information Security

iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT

iQIYI's proactive compliance risk disposal platform and full‑lifecycle privacy protection scheme were recognized by MIIT as outstanding cases, showcasing engineering‑driven privacy integration across product development, release, and operation, improving compliance rates, reducing risks, and enhancing user experience while setting industry standards.

Data SecurityMobile Internetcompliance
0 likes · 8 min read
iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT
Architects' Tech Alliance
Architects' Tech Alliance
Jan 22, 2024 · Fundamentals

Top 10 Technology Trends and Challenges for 2024

The article outlines ten major digital technology trends for 2024—including quantum computing, 6G communications, artificial intelligence, cloud‑native architectures, digital twins, privacy protection, Web 4.0, satellite communications, computing networks, and IoT—describing their principles, current status, and prospective applications.

6GArtificial IntelligenceQuantum Computing
0 likes · 16 min read
Top 10 Technology Trends and Challenges for 2024
php中文网 Courses
php中文网 Courses
Jul 12, 2023 · Mobile Development

Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature

This article explains how to adapt mobile apps to the latest Ministry of Industry and Information Technology network entry rules by covering basic mode design, personal data protection, permission request practices, update notifications, and signature authenticity, while also listing example implementations from popular apps.

Permission Managementapp updatemobile app
0 likes · 6 min read
Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature
DataFunSummit
DataFunSummit
Dec 15, 2022 · Information Security

Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice

This article examines the growing complexity of financial risk scenarios, outlines global privacy regulations, describes Ant Group's three‑layer multi‑party secure risk‑control architecture, showcases anti‑fraud and external client use cases, and discusses current challenges and future directions for secure, privacy‑preserving risk management.

financial securityprivacy protectionregulatory compliance
0 likes · 14 min read
Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice
AntTech
AntTech
Sep 28, 2022 · Artificial Intelligence

Advancing Trustworthy AI to Industrial-Scale Applications: Insights from Ant Group

The article outlines Ant Group's comprehensive approach to promoting trustworthy AI in large‑scale industrial settings, detailing the four core pillars of robustness, explainability, privacy protection, and fairness, and describing practical methodologies, open platforms, and ecosystem collaborations that drive responsible AI deployment.

AI safetyexplainabilityfairness
0 likes · 13 min read
Advancing Trustworthy AI to Industrial-Scale Applications: Insights from Ant Group
vivo Internet Technology
vivo Internet Technology
Sep 21, 2022 · Information Security

Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches

The 2022 Vivo Qianjing Cup Cybersecurity Challenge, launched on September 15 under the “Assemble! Geek Youth” theme, invites nationwide security enthusiasts to uncover vulnerabilities in Vivo products through online puzzles and an offline final, offering a 200,000‑yuan prize pool plus uncapped bounty rewards and judging by experts from AWS, Ant Group and leading universities.

cybersecurityinformation securityprivacy protection
0 likes · 5 min read
Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches
DataFunSummit
DataFunSummit
May 24, 2022 · Information Security

Data Masking Techniques and Their Applications in Enterprise Data Security

This article explains the importance of data security under emerging privacy laws and provides a comprehensive overview of data masking concepts, common technical methods, typical enterprise scenarios—including static, database, and application-level masking—and strategic considerations for balancing business needs with privacy protection.

Big DataData Securityanonymization
0 likes · 12 min read
Data Masking Techniques and Their Applications in Enterprise Data Security
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Data Securitydata maskingdynamic masking
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
Youzan Coder
Youzan Coder
Mar 14, 2022 · Information Security

Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice

To meet new Chinese privacy regulations, the article presents an mPaaS‑based solution that uses compile‑time Java HOOKs to replace privacy‑sensitive API calls and dangerous permission requests, automatically detecting and logging violations during build and runtime, and providing backend alerts and management tools for compliance.

ASMAndroidBytecode Manipulation
0 likes · 14 min read
Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice
DataFunTalk
DataFunTalk
Jan 26, 2022 · Information Security

Digital Watermarking for Data Leakage Tracing: Techniques, Applications, and Challenges

This article examines the rapid growth of China’s digital economy, the escalating risk of data leaks, and how digital watermarking—across images, text, and databases—can be applied to trace leaks, protect privacy, and address practical challenges in e‑commerce environments.

data leakagedatabase watermarkdigital watermarking
0 likes · 15 min read
Digital Watermarking for Data Leakage Tracing: Techniques, Applications, and Challenges
Alimama Tech
Alimama Tech
Sep 15, 2021 · Artificial Intelligence

Alibaba Mama Open‑sources Curvature Learning Framework and Federated Learning Solution

Alibaba Mama announced the open‑source release of its Curvature Space Learning Framework and a Federated Learning Solution, promising up to 80% storage savings, 15% matching‑precision gains, enhanced privacy through federated computation, and broader applicability across search advertising, logistics, finance and healthcare.

AICurvature LearningFederated Learning
0 likes · 8 min read
Alibaba Mama Open‑sources Curvature Learning Framework and Federated Learning Solution
Meiyou UED
Meiyou UED
Aug 25, 2021 · Mobile Development

How 3D, AR, Gyroscope, and Privacy Tech Are Redefining Mobile Experiences

From immersive 3D product displays and AR-driven interactions to gyroscope-enabled navigation, privacy safeguards, and seamless multi‑screen collaboration, emerging hardware and software innovations are expanding the capabilities of mobile devices, promising richer user experiences and new application possibilities across various industries.

3D applicationsaugmented realitymobile technology
0 likes · 10 min read
How 3D, AR, Gyroscope, and Privacy Tech Are Redefining Mobile Experiences
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

data anonymizationdata maskingdynamic masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices
Tencent Advertising Technology
Tencent Advertising Technology
Aug 4, 2020 · Artificial Intelligence

Federated Advertising and Recommendation: A New Direction in Digital Marketing

This article announces a live broadcast on federated learning for advertising and recommendation, featuring experts from Tencent Advertising and WeBank, discussing how federated learning enables privacy-preserving data sharing to enhance marketing effectiveness.

AI advertisingData SecurityFederated Learning
0 likes · 4 min read
Federated Advertising and Recommendation: A New Direction in Digital Marketing