In this seemingly thriving world of the Internet, there are big warlords, hidden forces and the hand of God. In the trend of consumption first, there are few good intentions to approach you. In addition, the domestic network environment is increasingly severe recently, so don’t close your eyes when it is dark. I hope the following points can protect you.


What are those three letters in the status bar of the screenshot you shared on Twitter?

Image manipulation: You don’t know how much information there is in an image

1. Modify the status bar information

Information about Altershot

Altershot offers a cleaner, safer status bar that you can choose to display or not display. You can choose to hide certain information from the status bar, including carrier, network status, time, and battery. Another nice option is the ability to manually switch the color of the status bar font (white or black). (Careful students will notice that the time is fixed at 9:41am.)

The free version can only export one image within 20 hours, and the information that can be modified is limited. The advanced version needs ¥25 to unlock.


(🤔 desktop processing Status bar to find ah find ah find a Status Cleaner welcome to taste.)

2. Cropping and coding are the easiest ways to hide important information

A variety of image processing software (such as PS) can meet our processing of key information, if you want to specialized can use the following software.

Snipaste is more than just a screengrab app. Its powerful tagging and texturing capabilities help you process screenshots.

MacOS can use the shortcut key to ⌘-⇧ -3/4 to take a screenshot and then go to edit to mark or process the item.

Android also has a software called “Pure Coding” to meet your needs.


And those of you who have upgraded to iOS 11 May find that once you’ve taken a screenshot, the system will put it in the lower left corner and you can edit it by clicking on it. You can simply adjust the display area down, hide the status bar, or use a pencil to blot out the information.

New screenshots for iOS

Important Information It is recommended to use the coding software with different algorithms to operate twice to prevent the reverse algorithm from deriving results.

3. Pay attention to the Exif information of the photo1 

Stripper is a software for processing photo information on Windows, which can remove EXIF information in pictures and delete modification records such as PS

The Exif Viewer allows the software that displays and processes Exif information to delete data, allowing you to set whether or not to overwrite the original image. The app also supports a Share Sheet for iOS that allows you to view your photo data within an album.

The other two apps are Exif Photos, which uses Nolocation to erase the location of an image.

Modify hidden photo information



These include Google Photos, Apple’s Album Smart recognition, and MIUI’s recent quick Photo Finder feature, all of which can quickly and accurately capture the content of an image. I’m not against the advancement of technology, but I should be wary of its misuse.

4. Share location information discreetly


When sharing running information, it is easy to lead to excessive content of open information. (Running apps are slightly more open about sharing traffic.)

Two key pieces of information — where you run and when you start and finish — are too easy for anyone to grasp. If you search for people nearby, you can see the running information of anyone nearby. If you click on that person’s home page, you can get their daily fitness information, and then their weekly and monthly running information.

If these information regularly presented in front of others, security risks really pay attention to. (Especially for girls who like to run at night.)

Use wechat location with caution, photos posted in wechat moments will be filtered out of location information, while photos you send to others will not. Please test your weibo and other social media.

Moments to share content appreciation

Do you, who use QQ to chat every day, know that QQ’s safety score is 0?

Chat tools: Wechat outside the fence within the other options

When wechat launched voice to text, my first reaction was fear. This is not keyword sniffing, but the whole piece of information is uploaded to the cloud (Tencent server) for processing, and the results are returned to the local side of wechat. In other words, Tencent understands every word you type and say.

However, I have tried to use some end-to-end encryption software around Amway. The effect is not ideal, people tend to choose the convenient end. Tencent has done a good job in this aspect, and wechat has a special version of instant messaging.

In addition, some students recommend iMessage. Firstly, the market share of iPhone is not as high as that of Android. Besides, most students who use iOS devices tend to be too lazy to use iMessage because they don’t have a circle of friends.

For more information on which instant IM apps are secure, see The One Day World. Which chat apps are more secure?


You see a this X fu Bao to my address book, do not give permission not to use.

Privacy permission: Don’t you want to explain the purpose of this permission

(👷 I am looking for a screenshot of Alipay not allowing it to launch without giving address book access.)

IOS has a feature that shows blue at the bottom of the status bar when an app uses the phone’s location permissions. We’re more familiar with the fact that the app shows green when using the phone’s call privileges.

Permissions occupied on iOS are displayed



When each application is used for the first time, it is asked what permissions it can obtain.

Application for the iOS startup permission

The Android version iteration also clarifies permission management. Domestic ROM is also constantly iterating, but android platform App overstepping its authority phenomenon is serious, a large number of unrestrained grab user privacy.

Application Permission Control

I don’t want to report every baozi I buy to Mr. Ma yun.

E-payments: the cashless society is the sword of Damocles

When you find that the bills in your wallet haven’t been touched for a long time, and all transactions are done by scanning them, do you wonder, what did I get for this convenience?

Sure, the idea of a cashless society is nice, but it’s not a way to give up your privacy when regulations and laws can’t keep up with the market.

If you think digital money is convenient, you can keep an eye on decentralized digital currencies like Bitcoin and Ethereum. I’ve seen an anchorwoman spend a day in Japan using bitcoin. If you are interested, please click 📺

Account security insurance is really necessary (seriously 😔).

Account security: A secure Internet environment is important

A lot of Internet software will encourage users to improve their personal information, and even take points to tempt you. At this time, we need to reflect, do I need to tell you these information? (Or is it for everyone?)

Cumbersome login Settings

Have they read the confidentiality agreement they’re talking about? And even if they did, would they feel sorry for them feel sorry for you?

Your name, address, phone number, IM and other social information family members and even sexual orientation are being watched.

Gently use the browser

  • Use privacy mode

Details of Safari on mobile
  • Use DuckDuckGo search



Little duck’s trick
  • Disable location information
  • Send stop tracking
  • Using a Network proxy
  • Web sites encrypted using HTTPS

Be careful to create an account

At the moment, you don’t have the right to ask your service provider to delete your information stored on their servers, at least I’ve tried and failed.

The story goes like this…

At that time, one of my classmates was promoting a campus installment payment. When the Deadline approached and we failed to meet the Deadline, my brothers helped me brush 10,000 yuan, and I received 2,000 yuan. We borrowed the money on the first day and paid it back on the second day. As a result, I found that there was a problem with credit investigation when I applied for a credit card. I checked that there was a problem with 2000 yuan at that time. I asked the agency that it was a mistake caused by system upgrade, and they could do nothing about my credit investigation.

Later, I also received several calls from their family recommending businesses. I said THAT I was no longer interested in this and could my information be deleted from their server, but they clearly replied that they could not. In addition, the harassing phone calls every day are also constant, so that every phone CALL I beg them to block me in a good voice, it can be seen how many times this information was sold.

So be careful to create an account, be careful to give out your information, and be the least valuable user.

Now more use of temporary mailbox registration, met the need for mobile phone number on the alili trumpet, really can not hide the past use of wechat weibo login, in addition to the use of oil monkey script can solve part of the website login only access to the problem.

Conclusion: the trade-off between security and convenience




Correction: IN the chat tool, I wrongly associated the security risks with the establishment of Apple’s Guizhou data center, which caused confusion to everyone. Sorry again. See the Apple announcement for details

Add: Everyone has privacy, and everyone has the right to deal with their privacy. This article is not intended to guide you, but to share your own opinions. And I object to the notion that there should be no privacy in this country.

Way of life
The Internet
Information security