Home Computer Tutorials Browser QQ responds by reading browser history: the data is used to determine whether the login is malicious.

QQ responds by reading browser history: the data is used to determine whether the login is malicious.

Feb 01, 2024 pm 06:06 PM
Log in data access qq browser

Xigua, the editor of php, introduced that QQ recently responded that the data read from the browser history is used to determine whether the login is malicious. It is understood that QQ will read browser history data when a user logs in, and determine whether the login is normal behavior by analyzing the websites the user has recently visited. This move is intended to increase account security and reduce the risk of malicious logins. However, this approach has also caused concerns and doubts among some users. Today, when privacy protection has become a hot issue, how to balance security and privacy has become an issue that requires serious consideration.

QQ responds by reading browser history: the data is used to determine whether the login is malicious.

Tencent QQ responded to this question on its official Zhihu account, saying that recently we have received external feedback that PCQQ scanned and read the browser's history. Our QQ security team takes this very seriously and immediately launched an investigation. After investigation, we found that PCQQ does read browser history, but this is to determine the security risk of user login. These read data are only used for judgment in PCQQ's local client to identify whether there is a malicious login. It is worth emphasizing that all relevant data will not be uploaded to the cloud, will not be stored, and will not be used for any other purpose. We handle this issue very carefully to ensure user privacy and data security. At the same time, we also welcome further questions and feedback from users on this matter, and we will continue to pay attention and take appropriate measures to protect the rights and interests of users.

The specific situation is that this operation is a technical solution against malicious logins launched in history: because the system has identified that many fake QQ clients will maliciously access multiple websites as preliminary auxiliary work, so in PCQQ Access logic for detecting malicious and abnormal events is added to the client as an auxiliary means to identify malicious clients.

Tencent said that it deeply apologizes for this incident and is internally sorting out historical issues and strengthening user data access standards. At present, the technical logic for detecting malicious and abnormal requests has been replaced to solve the above security risk issues, and a new PCQQ version has been released. To reduce inconvenience, all affected historical versions of PCQQ will undergo hot updates and push upgrade packages starting today. At the same time, the above operations do not exist on mobile QQ and will not be affected.


The above is the detailed content of QQ responds by reading browser history: the data is used to determine whether the login is malicious.. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

What to do if the xlsx file cannot be opened on mobile phone What to do if the xlsx file cannot be opened on mobile phone Apr 25, 2024 am 08:28 AM

Why can’t WPS and Excel documents be opened on Apple’s mobile phone? It shows that the file cannot be previewed. 1. The reason why WPS and Excel documents cannot be previewed on Apple’s mobile phone is because there are no applications that support these file formats installed on the mobile phone. The solution is to install an application that supports the document format. Application to convert documents to PDF format and send documents to computers or other devices for opening. 2. First check what the suffix of the file is. If it is an excel file but cannot be opened, it means that the file type is not registered in the computer's folder options. 3. First, open the QQ browser on your mobile phone; click the button in the middle below; click "File Download"; click "Document" to select the excel file you want to open. Summary Open QQ browsing

Single card running Llama 70B is faster than dual card, Microsoft forced FP6 into A100 | Open source Single card running Llama 70B is faster than dual card, Microsoft forced FP6 into A100 | Open source Apr 29, 2024 pm 04:55 PM

FP8 and lower floating point quantification precision are no longer the "patent" of H100! Lao Huang wanted everyone to use INT8/INT4, and the Microsoft DeepSpeed ​​team started running FP6 on A100 without official support from NVIDIA. Test results show that the new method TC-FPx's FP6 quantization on A100 is close to or occasionally faster than INT4, and has higher accuracy than the latter. On top of this, there is also end-to-end large model support, which has been open sourced and integrated into deep learning inference frameworks such as DeepSpeed. This result also has an immediate effect on accelerating large models - under this framework, using a single card to run Llama, the throughput is 2.65 times higher than that of dual cards. one

How to remove the write protection of a USB flash drive? Several simple and effective methods can help you do it How to remove the write protection of a USB flash drive? Several simple and effective methods can help you do it May 02, 2024 am 09:04 AM

U disk is one of the commonly used storage devices in our daily work and life, but sometimes we encounter situations where the U disk is write-protected and cannot write data. This article will introduce several simple and effective methods to help you quickly remove the write protection of the USB flash drive and restore the normal use of the USB flash drive. Tool materials: System version: Windows1020H2, macOS BigSur11.2.3 Brand model: SanDisk UltraFlair USB3.0 flash drive, Kingston DataTraveler100G3USB3.0 flash drive Software version: DiskGenius5.4.2.1239, ChipGenius4.19.1225 1. Check the physical write protection switch of the USB flash drive on some USB flash drives Designed with

Usage of service layer in java Usage of service layer in java May 07, 2024 am 04:24 AM

The Service layer in Java is responsible for business logic and business rules for executing applications, including processing business rules, data encapsulation, centralizing business logic and improving testability. In Java, the Service layer is usually designed as an independent module, interacts with the Controller and Repository layers, and is implemented through dependency injection, following steps such as creating an interface, injecting dependencies, and calling Service methods. Best practices include keeping it simple, using interfaces, avoiding direct manipulation of data, handling exceptions, and using dependency injection.

What does schema mean in mysql What does schema mean in mysql May 01, 2024 pm 08:33 PM

Schema in MySQL is a logical structure used to organize and manage database objects (such as tables, views) to ensure data consistency, data access control and simplify database design. The functions of Schema include: 1. Data organization; 2. Data consistency; 3. Data access control; 4. Database design.

Data Security in Artificial Intelligence: How to Unleash the Power of Artificial Intelligence Data Security in Artificial Intelligence: How to Unleash the Power of Artificial Intelligence Apr 24, 2024 pm 06:20 PM

In the digital age, data is often viewed as the battery that powers the innovation machine and drives business decisions. With the rise of modern solutions like artificial intelligence (AI) and machine learning (ML), organizations have access to vast amounts of data, enough to gain valuable insights and make informed decisions. However, this comes at the cost of subsequent data loss and confidentiality challenges. As organizations continue to grasp the potential of artificial intelligence, they must strike a balance between achieving business advancements while avoiding potential risks. This article focuses on the importance of data security in artificial intelligence and what security measures organizations can take to avoid risks while taking advantage of the viable solutions provided by artificial intelligence. In artificial intelligence, data security is crucial. Organizations need to ensure data used is legal

The role of PHP functions in separating business logic and data access The role of PHP functions in separating business logic and data access May 02, 2024 pm 03:45 PM

PHP functions can realize the separation of business logic and data access. By encapsulating data access code in functions, the reusability, maintainability, testability and code separation of the code can be improved.

How to upload running data to keep How to upload running data to keep May 04, 2024 pm 10:51 PM

Steps to upload running data to Keep: 1. Connect the device and authorize data access; 2. Turn on automatic synchronization; 3. Manually upload data (if the device does not support automatic synchronization).

See all articles