An Internet giant has been accused of data infringement. When will data security and data rights confirmation be achieved?

An Internet giant has been accused of data infringement. When will data security and data rights confirmation be achieved?

On July 30, 2020, the Beijing Internet Court issued a first-instance verdict, finding that both Douyin and WeChat Reading apps had violated user personal information. The two cases also became typical cases after the promulgation of the Civil Code of the People's Republic of China, reflecting the Civil Code's protection of citizens' personal information rights in the Internet era.

The topic of "data misuse" is a cliché, especially nowadays when we are highly dependent on centralized applications, data privacy has become extremely important.

Next, let’s review the details of the two giants’ cases:

“People You May Know” – Infringement

In the case of Ling Moumou v. Douyin, the plaintiff had no other contacts in his mobile phone address book except himself. However, after using the mobile phone number to register and log in to the Douyin App, a large number of "people you may know" were recommended to him, including classmates and friends who he had not contacted for many years.

The court held that name, mobile phone number, social relationships, and geographic location are personal information and constitute infringement if the plaintiff’s consent is not obtained.

"Reading Records" - Infringement

When the plaintiff was using the "WeChat Reading Version 3.3.0", he discovered that without obtaining the plaintiff's consent, the software would automatically follow WeChat friends and disclose reading information to unfollowed WeChat friends by default, posing a high risk of infringing user privacy.

In fact, everyone understands that in the era of big data, users' personal information is very dangerous. It is not just Douyin and WeChat Reading, but many other products have infringed user information.

Therefore, on May 25 this year, the Third Session of the 13th National People's Congress passed the Civil Code of the People's Republic of China, which was officially released in full on June 1 and stipulates privacy rights and personal information protection.

However, under the current Internet model, user data issues have persisted despite repeated bans, and so many major problems have erupted before and after. If we want to make changes, we must start with the most basic protocols.

01

IPFS, the cornerstone of Web3.0

As the underlying network protocol, IPFS has unique advantages. There is no central location for files in the IPFS network, and the system has built-in encryption functions and is addressed through content.

The IPFS network, which is content-addressed, is immutable and users cannot edit files. Each change will create a new file, and IPFS built-in tools allow users to add, delete, move, edit files, and update links.

The existing centralized HTTP protocol processes data on the Internet in a high-speed, low-latency, high-availability, and fast-production manner. However, this beauty comes at the cost of serious defects, such as hacker attacks, security vulnerabilities, etc. There is a serious lack of review and control over data, and once attacked, it is likely to cause irreparable losses.

Today, when data has become the seventh factor of production, distributed storage is safer than centralized storage.

Similarly, in this case, if the data is encrypted, then Internet giants will not be able to use the data and infringe on user privacy.

02

Filecoin solves data explosion

With the development of the Internet, the way of communication has changed from text-image-video, especially the conversion of image-text-video. Data is constantly increasing. In addition, users' requirements are getting higher and higher. 2k, 4k, 8k, and VR have made data grow explosively. Do you remember our military parade in October 2019? At that time, 8K high-definition live broadcast was used, reaching 10-100 bp in just half an hour. When we realize Industry 4.0, or smart cities and intelligent manufacturing, the amount of data information will "explode".

Conversely, to achieve Industry 4.0, the cost of data storage and transmission must be reduced. Filecoin was born to solve the storage and transmission problems after the data explosion. Under the Filecoin system, data storage is more secure, and point-to-point transmission makes the speed faster and the cost lower.

Filecoin, which has its own value, has an industrial foundation, as well as storage and retrieval markets.

03

Filecoin optimizes the Internet

Filecoin has a huge optimization effect on the network, mainly in the following three aspects.

Network: Filecoin uses the IPFS protocol as a data transmission and positioning tool, which saves nearly 60% of bandwidth compared to centralized storage, saving broadband utilization.

Data storage: The Filecoin network optimizes data. Data will be placed closer to where the data is frequently used. This balancing function provides technical support for the optimization of the Internet.

Distributed development: Nowadays, the increase in data has repeatedly broken people's cognition, such as the terrifying traffic brought by Double Eleven and Spring Festival trains. These all require the centralized and concentrated storage to be transformed into distributed structure storage.

When data becomes a factor of production, there will be an explosive growth in productivity, and data rights confirmation and data storage are the most important topics that cannot be missed at the moment. We have reason to believe that Filecoin, which has been honed for three years, will eventually bring the most secure protection for data.

<<:  Equity Road explains the Bitmain dispute in detail: Who will win between Wu and Zhan? What should the partners do? (Recommended reading)

>>:  Recommended article: How to determine the benefits of Filecoin cloud computing power? Why are large miners restricted? (Taihe Capital)

Recommend

Can forehead wrinkles attract love? I have no charm.

If a person can attract love luck, it means that ...

Boost VC has invested $52 million in 52 Bitcoin and blockchain companies

Boost VC, the San Bernardino, California-based in...

Facial analysis: What does protruding teeth indicate?

We all know that teeth are an indispensable part ...

Mole analysis: what does a mole on the sole of the foot mean

Everyone may have some small black moles on their...

Are big ears a blessing?

Modern medicine believes that big ears are relate...

Analysis of the six facial features of women with miserable lives

As one of the traditional physiognomy techniques, ...

Bitget China Tour Shanghai Cocktail Reception Successfully Held

On April 12, Bitget's China Tour Shanghai coc...

See your life through ear physiognomy

People who pay attention to physiognomy know that...

How to tell your fortune from your body shape

How to tell your fortune from your body shape Men...

Not good at expressing one's own thoughts

Having ideas is a state we advocate. People with ...

Facial features that require caution

Facial features that require caution As the sayin...