Qihoo 360 black box appeared: the alleged secret operations on the user’s personal information


Chinese-style Apples


The crack of the illegal operation of Qihoo 360 security guards is a lot of fun cat-and-mouse thing.

Independent investigators claimed that he has the basic crack the mystery of the Board of Qihoo 360 security guards, but away from the release is still too early ", because he had to do things of iron nails.

So far, the most important evidence has been disclosed to independent investigators in its micro-Bo on December 6, 2012 released a video (http:/weibo.com/2902756801/z8BUvfWqe).The this video exhaustively crack Qihoo 360 security guards the confidentiality of the user information.

Independent investigators told reporters, recorded this video of 13 minutes and 36 seconds to complete the practices uncovered evidence Qihoo 360 theft of user privacy.It proves that the "action" Qihoo 360 collected in the user's computer, upload user information, rampant simple, conventional software operating behavior will be recorded, has nothing to do with security issues, these information are in the user's personalPrivacy category. "

According to independent investigators claimed that this video material is not its acquisition, production, "but from a self-proclaimed security experts anonymous microblogging private letter, he broke the news to independent investigators: they have mastered the oddtiger 360 security guards to steal user privacy 7.3 and upload it to the the Qihoo 360 server judicial evidence, can now be free of charge to this judicial evidence to him.

About this evidence, independent investigators to Qihoo 360 "a small bomb" in court is powerful evidence in court.

Obviously, Qihoo 360 companies in the personal information collection, processing, transfer, delete, and other sectors, significantly the rules of the game in the industry throw aside, insisting on secret operations.

  • Qihoo 360: Internet "goldenrod"
  • The Qihoo 360 backdoor: kidnapping user remote control
  • Qihoo 360 backdoor Shame of security

No comments:

Post a Comment