Presumably, many people have eaten a melon in the first two days. To put it simply, the relationship between Meng Meiqi and a scumbag has been exposed, but this scumbag has a girlfriend, so in the eyes of netizens, Meng Meiqi has naturally become a “little three.” Well, everyone eats melons and complains about the private lives of celebrities. But the point is that something very strange happened this time.
As long as you post Meng Meiqi-related remarks on Weibo, you will be bombarded by phone calls and text messages.
For example, the blogger was bombarded with more than one hundred text messages because he published some of his opinions.
Others have been bombed to tear their faces and decided to scold Meng Meiqi every day until they were not bombed.
There were many people who were bombed. Whether it was a marketing account or a big V, as long as they discussed the Meng Meiqi incident, they could not escape the bombing claws.
In the same situation, several up masters at station B also appeared.
It was bombed because of disapproval of Meng Meiqi’s remarks. At first glance, this wave of operations seemed the most beneficial and most likely to be done by the Meng Meiqi team.
Many netizens thinkIn order to manipulate public opinion, the team behind Meng Meiqi threatened them with SMS bombing.
In fact, it’s hard to say who did this thing. Everyone may be the initiator behind it.
BecauseGet via Weibo IDcell phoneNo. and carry out harassment. This operation does not require the support of any professional team.
You just call a primary school student to come, and he can do it too.
I’m not alarmist. Today, Shichao will discuss how easy it is to harass others.
You should have seen a lot of news about user data leaks before. The most well-known ones are the data leaks of Weibo and Netease mailboxes (this incident may have something to do with the data leaked out of Weibo before).
The leaked user data will be bought by some black production platforms, and the black production platforms will then provide them to netizens at a fee.
Take for example the methods that Shi Chao knows.
If you search a channel with keywords such as “human flesh” on a certain foreign social software, you will find a lot of platforms where you can inquire about personal information. (I won’t tell you where to search, the less people you know, the better)
After entering these platforms, you only need to enter any information of a person (name, Weibo ID), and it can match other data of the person based on this information, including ID card, phone number, address, ID of some platforms, and even password.
If you are willing to spend more money, the information you can find will be more comprehensive.
This is the information found by Shichao, except for the password, the information is basically the same ▼
The operation of obtaining the mobile phone number is completed here. Does this require any professional technical support?
Similarly, if you want to bomb other people’s mobile phones, the operations to be done are definitely much simpler than you think.
As long as you have certain search skills, you can definitely find these SMS bombing platforms on search engines. (Although it is a nonsense, but I can’t say how to search specifically.)
To enter these platforms, you do not need to register an account or pay. You only need to enter the phone number you just found, and click “Start bombing”.
Shi Chao deliberately tried his own number, and the phone vibrated faster than grandma’s sewing machine.
You must have seen that with these ready-made platforms, even a second-year elementary school student can complete a wave of “top hacker” operations.
So the Meng Meiqi incident, I thinkIt is these black production platforms that should be rectified most.
If we don’t engage them, everyone can arbitrarily humanize others, bombarded by text messages, how should our privacy and life be protected?
Although we have caught many criminals who provide bombing services in recent years, it is still a headache. .
Because it uses the form of a verification code sent by the company to harass you, our interception SMS APP is not very good at blocking this type of SMS.The most important thing is that it is not easy to trace the origin to find these instigators.
In fact, it is a coincidence that the black production platform adopts the form of verification code.
SMS bombing started in the era of PHS in 2005, mainly relying on a gadget called Maochi.
“Cat Pool” can be inserted into a large number of SIM cards, you can regard it as a multi-card multi-standby mobile phone, can use multiple card numbers to make calls and send text messages at the same time.
The way of harassment is simple and rude, that is, madly swearing at you.
But the key is that the cost of harassment is relatively high, and sending a text message costs 1 cent.
It was not until later that the SMS verification code became popular. Because the cost of the verification code was collected from the developer, the criminals wanted to use the SMS verification code to complete the bombing.
They integrate into their own website by collecting the SMS interface of a large number of websites. Commands will be issued when the bombing is about to occur, and major websites will send text messages to the victim’s mobile phone.
The most important thing is that it belongs to the normal call of the SMS interface, which these developers can’t prevent.
If you really want to prevent the use of these hacked platforms, developers can add a graphic verification program before sending the verification code.
Only after passing the verification can the verification code be sent to the mobile phone number.
Although one more step during the registration phase will increase the user’s bounce rate, some developers have already done so.
Similarly, the “Personal Information Protection Law” that we formally implemented at the beginning of this month can be said to take privacy protection to the next level.
Our name, ID number, telephone number, and address are all personal information, and no organization or individual may illegally collect or transmit personal information of others.
With relevant laws and regulations to make up for legal gaps and deficiencies, only when major apps protect user data, criminals who sell data will be severely punished, and privacy protection can get better and better.
At present, countries and enterprises are working hard to protect privacy and anti-harassment. I hope that through this SMS harassment incident, this process can be accelerated~