Qihoo 360: Internet cancer cells


Chinese-style Apples


"If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "

Independent investigators said, do not underestimate Apple Inc. issue 360 download, this deadline shelves most likely is "permanent". Why a got such a huge influence in China, will be encountered in a global company at the opposite treatment? "This only shows that now the Internet space is not the ability to overcome their own malignant tumor Apple Inc shelf Qihoo 360 behind showed up tumor the autologous immune rejection, which is a sign of the health of the network society. "

The Internet is the same with the human body itself has anti-cancer immunity. Once cancer itself will start the automatic identification and exclusion mechanisms, such as the principle of least privilege is the Internet arena to prevent itself "cancerous immune mechanism.

This privilege is the most popular saying is: you do not replace the exercise of powers, the smaller your prerogative as little as possible. This is the maximum protection to the user. Not as at the omission.

"Qihoo 360 'genetic variation' is reflected this, showed 'Qihoo 360 principle' – the name of security, in the case of user knowingly or unknowingly, directly on behalf of Internet users in the exercise of equity." Independent investigatorssaid, "In fact, the least privilege principle is very simple, such as a telephone inspector to check your home phone is normal so that, when the owner was not at home, directly open the doors of your home, try the phone; orbecause your dog barking, property to open the door of your home directly kill the dog, which are in violation of the principle of least privilege. Qihoo 360 biggest problem is the name of security, trampling the principle. "

Qihoo 360 is through a chain of program design, like the beginning of this article, the security company K, like the monitor owners couples intercourse, or just like telephone inspector went straight to open the master door check line, or like propertyowners door opened directly into the kill, like the owner's dog, rampaging in the user's computer, unconscionable? Qihoo 360 products behind layers of black-box operation chain will uncover readers.

 

  • Qihoo 360: Internet "goldenrod"
  • The Qihoo 360 backdoor: kidnapping user remote control
  • Qihoo 360 backdoor Shame of security

No comments:

Post a Comment