The technical interpretation of Zhou Hongyi and the argument of the classics

 

 

Zhou Hongyi

independent media Yang Miao

this afternoon, the 360 company to the media open day for the first time in the form of the "daily economic news" recently reported "360 black box puzzle: Qihoo 360" cancer genes revealed "one by one response. I was admitted as an independent media person (this is because it is said that some of the technical staff and "every" reporter was refused entry), recorded the main points of the response to the problem. Due to technical problems involving more, I will try my ability of reading, but after all, not the technology cattle industry, have to understand also missed.

daily news reports can be divided into two parts, one part is the 360 for product safety, business models and other aspects of the report are quoted, reproduced, the other part is based on the technical personnel and related industry interviews, the survey results, the data and conclusions. The first part involves the complex, the time span is very big, some aspects of the 360 aspects of the problem has been in various forms of response, so the media is not a lot of questions on the spot, I did not spend too much energy to reproduce. We mainly ask and reproduce the amount of new information that has been reported.

is the first mentioned in the report is the 360 security browser in the user does not operate frequently with the back-end server communication. The report reads as follows:

independent investigators for the daily economic news reporter conducted a live demonstration. He has installed 360 security browser on your computer and open communication network monitoring tools, then you can see the 360 security browser like a worker in the computer room, always kept busy.

then, independent investigators also open IE, Tencent, cheetah, chrome and other browsers, each browser is very quiet, no action.

"what is the 360 security browser doing? Nobody knows. Why are you so busy? As a browser, it can be used to display the contents of the HTML file on the web server or the file system, and to allow users to interact with these files. According to the principle of least privilege, you have no reason to keep working on my computer. You ask him what he’s doing, he says, it’s for your safety."

this report raises the question of whether the browser is uploading data in the background when the user is not working, and if so, does the data contain user information and privacy?

360Zhou Hongyi, chairman of

360 at the scene to respond to this problem. He said that the 360 browser is the world’s first concept of security as the main browser. In order to isolate the user from malicious URLs in real time, the browser will work with the service every 5 minutes

 

 

Zhou Hongyi

independent media Yang Miao

this afternoon, the 360 company to the media open day for the first time in the form of the "daily economic news" recently reported "360 black box puzzle: Qihoo 360" cancer genes revealed "one by one response. I was admitted as an independent media person (this is because it is said that some of the technical staff and "every" reporter was refused entry), recorded the main points of the response to the problem. Due to technical problems involving more, I will try my ability of reading, but after all, not the technology cattle industry, have to understand also missed.

daily news reports can be divided into two parts, one part is the 360 for product safety, business models and other aspects of the report are quoted, reproduced, the other part is based on the technical personnel and related industry interviews, the survey results, the data and conclusions. The first part involves the complex, the time span is very big, some aspects of the 360 aspects of the problem has been in various forms of response, so the media is not a lot of questions on the spot, I did not spend too much energy to reproduce. We mainly ask and reproduce the amount of new information that has been reported.

is the first mentioned in the report is the 360 security browser in the user does not operate frequently with the back-end server communication. The report reads as follows:

independent investigators for the daily economic news reporter conducted a live demonstration. He has installed 360 security browser on your computer and open communication network monitoring tools, then you can see the 360 security browser like a worker in the computer room, always kept busy.

then, independent investigators also open IE, Tencent, cheetah, chrome and other browsers, each browser is very quiet, no action.

"what is the 360 security browser doing? Nobody knows. Why are you so busy? As a browser, it can be used to display the contents of the HTML file on the web server or the file system, and to allow users to interact with these files. According to the principle of least privilege, you have no reason to keep working on my computer. You ask him what he’s doing, he says, it’s for your safety."

this report raises the question of whether the browser is uploading data in the background when the user is not working, and if so, does the data contain user information and privacy?

360Zhou Hongyi, chairman of

360 at the scene to respond to this problem. He said that the 360 browser is the world’s first concept of security as the main browser. In order to isolate the user from malicious URLs in real time, the browser will work with the service every 5 minutes

Leave a Reply

Your email address will not be published. Required fields are marked *