lately , Some netizens revealed that , Wechat in the latest beta , Added the own input method . As long as in the wechat settings , You can find the “ Wechat keyboard ” Plug in for , When chatting on wechat , The input method of wechat will be called to input the problem .

   For this improvement , Many friends have a question mark , Is the built-in input method ineffective or the third-party input method ineffective , A chat
App, It's not necessary to reinvent the wheel ? Why does wechat develop its own input method ? Let's talk about it .


   Wechat internal test added its own keyboard

   Why should wechat be its own input method ?

   According to wechat , Wechat has its own keyboard . According to media reports , Zhang Xiaolong said that wechat didn't want to be an input method , However, many users complained that their chat records were stolen , Because the input will see the corresponding advertising . Zhang Xiaolong explained , Wechat does not save chat records , Wechat also stipulates that anyone who reads a user's chat record will be dismissed .

   Is this explanation reliable ? I think it is reasonable . Input method is used as the channel for users to type information , Naturally, it has the ability to spy on users' information . Many friends have given feedback in recent years , E-commerce platform began to push what they wanted for no reason , Even suspect that there is
App Recording eavesdropping in the background , But this is probably related to the disclosure of personal information by input method .

   Will input methods really steal privacy ?

   actually , Input method will leak personal information , This is a common sense . Modern input methods generally have the function of networking , To achieve thesaurus synchronization and even cloud thesaurus , This kind of function from the mechanism , It will upload the words and sentences you input to the cloud . If the service provider of input method wants to spy on users , I have the ability to do it .

   Cloud thesaurus and other functions have become the standard of the third-party input method

   In this regard , Privacy focused platform , All of them regulate the input method to a certain extent . Apple, for example iOS
In a long time , Third party input methods are not allowed , Now even if the entrance of the third-party input method is opened , However, access to the password box is not allowed by default , Prohibit network access and snooping context . Android is weak in this aspect , However, the native Android system enables third-party input method , There are also hints that personal data may be collected .

   Android will alert you to the risks of using third-party input methods

   in addition to , Some highly security oriented
App, Third party input methods will also be restricted . For example, some mobile banking clients , When you enter a password, you call your own keyboard , Instead of using the default input method of the current system , To prevent key information such as passwords from being spied .
This time, wechat comes with its own keyboard , It seems that the importance of security has been raised to mobile banking App One level , Is this necessary ? Leave it to the user to comment .

   How to prevent input method from stealing privacy ?

   Input methods do have the ability to pry into privacy , So how should we guard against it ? Here's some experience .

  - Use the system's own input method . Compared with the third party input method , The system's own input method is often less complicit with the promotion platform . for example iOS
Built in input method , There's not even networking like cloud input . But it also needs to be noted , Some systems have their own input methods, which are customized from a third party , There is also the possibility of divulging personal information .

  - Forbid the third party to input key permissions . If you think third-party input method is indispensable , This kind of method can be used . For example, in iOS
In the system , Do not open full access to input methods , In Android system, the input method can be disabled , Or get your ID ( It is usually manifested as obtaining telephone authority ).

   Carefully open full access to input method

  - Use more credible input methods . For example, you can use an input method without networking , Or do not open the input method of the cloud thesaurus , Cloud synchronization . Another idea is to use the input method of not doing business in China , For example, Google's
Gboard wait .


   in general , The mechanism of input method itself determines that it can spy on user information , After joining the networking function , There is a risk of privacy leakage . The comprehensive experience of the third-party input method is still higher than that of the self-contained input method , And cloud related functions can really greatly improve the user experience , How to balance convenience and safety ? I'm afraid it's a question worthy of deep thinking .

©2019-2020 Toolsou All rights reserved,
Hikvision - Embedded software written test questions C Language application 0 The length of array in memory and structure is 0 In depth analysis data structure --- The preorder of binary tree , Middle order , Subsequent traversal How to do it ipad Transfer of medium and super large files to computer elementui Shuttle box el-transfer Display list content text too long 2019 The 10th Blue Bridge Cup C/C++ A Summary after the National Games ( Beijing Tourism summary )unity Shooting games , Implementation of first person camera python of numpy Module detailed explanation and application case Study notes 【STM32】 Digital steering gear Horizontal and vertical linkage pan tilt Vue Used in Element Open for the first time el-dialog Solution for not getting element