On July 30, 2020, the Beijing Internet Court issued a first-instance verdict, finding that both Douyin and WeChat Reading apps had violated user personal information. The two cases also became typical cases after the promulgation of the Civil Code of the People's Republic of China, reflecting the Civil Code's protection of citizens' personal information rights in the Internet era. The topic of "data misuse" is a cliché, especially nowadays when we are highly dependent on centralized applications, data privacy has become extremely important. Next, let’s review the details of the two giants’ cases: “People You May Know” – Infringement In the case of Ling Moumou v. Douyin, the plaintiff had no other contacts in his mobile phone address book except himself. However, after using the mobile phone number to register and log in to the Douyin App, a large number of "people you may know" were recommended to him, including classmates and friends who he had not contacted for many years. The court held that name, mobile phone number, social relationships, and geographic location are personal information and constitute infringement if the plaintiff’s consent is not obtained. "Reading Records" - Infringement When the plaintiff was using the "WeChat Reading Version 3.3.0", he discovered that without obtaining the plaintiff's consent, the software would automatically follow WeChat friends and disclose reading information to unfollowed WeChat friends by default, posing a high risk of infringing user privacy. In fact, everyone understands that in the era of big data, users' personal information is very dangerous. It is not just Douyin and WeChat Reading, but many other products have infringed user information. Therefore, on May 25 this year, the Third Session of the 13th National People's Congress passed the Civil Code of the People's Republic of China, which was officially released in full on June 1 and stipulates privacy rights and personal information protection. However, under the current Internet model, user data issues have persisted despite repeated bans, and so many major problems have erupted before and after. If we want to make changes, we must start with the most basic protocols. 01 IPFS, the cornerstone of Web3.0 As the underlying network protocol, IPFS has unique advantages. There is no central location for files in the IPFS network, and the system has built-in encryption functions and is addressed through content. The IPFS network, which is content-addressed, is immutable and users cannot edit files. Each change will create a new file, and IPFS built-in tools allow users to add, delete, move, edit files, and update links. The existing centralized HTTP protocol processes data on the Internet in a high-speed, low-latency, high-availability, and fast-production manner. However, this beauty comes at the cost of serious defects, such as hacker attacks, security vulnerabilities, etc. There is a serious lack of review and control over data, and once attacked, it is likely to cause irreparable losses. Today, when data has become the seventh factor of production, distributed storage is safer than centralized storage. Similarly, in this case, if the data is encrypted, then Internet giants will not be able to use the data and infringe on user privacy. 02 Filecoin solves data explosion With the development of the Internet, the way of communication has changed from text-image-video, especially the conversion of image-text-video. Data is constantly increasing. In addition, users' requirements are getting higher and higher. 2k, 4k, 8k, and VR have made data grow explosively. Do you remember our military parade in October 2019? At that time, 8K high-definition live broadcast was used, reaching 10-100 bp in just half an hour. When we realize Industry 4.0, or smart cities and intelligent manufacturing, the amount of data information will "explode". Conversely, to achieve Industry 4.0, the cost of data storage and transmission must be reduced. Filecoin was born to solve the storage and transmission problems after the data explosion. Under the Filecoin system, data storage is more secure, and point-to-point transmission makes the speed faster and the cost lower. Filecoin, which has its own value, has an industrial foundation, as well as storage and retrieval markets. 03 Filecoin optimizes the Internet Filecoin has a huge optimization effect on the network, mainly in the following three aspects. Network: Filecoin uses the IPFS protocol as a data transmission and positioning tool, which saves nearly 60% of bandwidth compared to centralized storage, saving broadband utilization. Data storage: The Filecoin network optimizes data. Data will be placed closer to where the data is frequently used. This balancing function provides technical support for the optimization of the Internet. Distributed development: Nowadays, the increase in data has repeatedly broken people's cognition, such as the terrifying traffic brought by Double Eleven and Spring Festival trains. These all require the centralized and concentrated storage to be transformed into distributed structure storage. When data becomes a factor of production, there will be an explosive growth in productivity, and data rights confirmation and data storage are the most important topics that cannot be missed at the moment. We have reason to believe that Filecoin, which has been honed for three years, will eventually bring the most secure protection for data. |
If a person can attract love luck, it means that ...
If implemented, the proposal would create a singl...
What does the marriage line on palmistry mean? Th...
Boost VC, the San Bernardino, California-based in...
We all know that teeth are an indispensable part ...
The height of the ears determines different destin...
Everyone may have some small black moles on their...
Modern medicine believes that big ears are relate...
As one of the traditional physiognomy techniques, ...
On April 12, Bitget's China Tour Shanghai coc...
People who pay attention to physiognomy know that...
Solana (SOL) reached a high of $51, the apex of a...
How to tell your fortune from your body shape Men...
Having ideas is a state we advocate. People with ...
Facial features that require caution As the sayin...