Double eleven come | Know why you always can not get it

E-business Double eleven neighbors, you gearing up in front of the computer, constantly refresh the page, ready to grab a few coupons, and I believe this collection of goods is determined to win.But when you punctually refresh, coupons or instantly disappear, beloved goods inventory Seconds have become 0. feel very depressed at the same time, you are not very puzzled: why?

Such a scene, have experienced a business partner Carnival Day may have had a small partner, but you do not know is that the same computer sitting at your speed, in addition to normal users, there are a number of professional wool party, they Harder than you, prepared for longer, and more 'professional' ... as a direct 'competitor' to snatch our benefits, it is necessary for us to get a good acquaintance with these 'familiar strangers.' Who are they and why? Why say they are not only horrible but horrible?

Crime gang: from 'corruption NGO' to 'professional underground ash production'

If you are interested in the QQ group search bar to 'wool' as the keyword search, the result may give you an eye-opener, yes, the Folk Wool Party easier to reach than you think of more, all kinds of wool The size of the organization varies in size and is clearly visible:

In the Internet marketing activities of all kinds, businesses in order to pull new, promotion, publicity and other commercial goals, there will be a variety of consumer-oriented lottery, pull the new benefits, coupons, discount vouchers and other kinds of concessions.In addition to normal consumption In addition to receiving these benefits, there are also a group of professional wool organizations and professional underground people who specialize in preferential marketing campaigns for Internet companies, register new listings, buy tickets, grab coupons and buy low prices at high prices Sell, etc., at low cost or zero cost in exchange for high rewards.We call such people as 'wool party.'

The Wool Party, which has long ceased to be as simple as a "non-governmental organization for the sake of cheapness," has formed a lucrative and well-organized organization with a high degree of organization and roughly estimates that there are hundreds of thousands of gangs in the country. From the Internet giant to the Internet giant, Down to ordinary companies, as long as the marketing activities, may face a tremendous threat to Wool Party.

So, wool party in the whirlwind?

Crime target: the main electricity supplier, O2O, mutual gold, social

Where the welfare benefits and more, where they have them.The most active platform for marketing activities, is the main target of the wool party crime, including O2O platform, e-commerce platform, social platform, Internet finance platform.

Some network loan platform to pull new users often introduce some lucrative activities, such as registration certification reward, recharge back, the tender rebate, gave birth to this parasitic P2P Wool Party in the P2P platform, a promotion from dozens From Yuan to Hundreds of Yuan, the "Wool Party" can earn tens of thousands to hundreds of thousands every month. It can be said to be "very impressive."

In this year's well-known shared cycling war, a well-known domestic shared cyclist launched the "Cycling-collar Red Packet" campaign and also encountered a situation where the Woolfone faked its address and grabbed a red envelope. The Wool Party used positioning modification software and bulk handsets Number of software, you can do without leaving your home cycling bike and receive their distribution of red envelopes.According to estimates, the average per person can brush about 5 red envelopes, about 16 times a day income of 80 yuan, multiple accounts bulk operations can Japan into a few million.

Accusation crime: collapse of listed companies is not alarmist

In addition to the damage to the welfare of normal users, Wool Party more harm or the invisible swallowing of the interests of enterprises.Woman party split minute a listed company is not never happened.

In recent years, only two years of live video fire as an example.According to media research, in August 2016, a wholly owned subsidiary of a listed company push live software, as long as the registration of the live broadcast every day for 10 minutes, the first day of 30 yuan, 30 yuan the next day, the third day or 30 yuan, 10 yuan a day later, and the next day you can withdraw now with a single account anchor, the other trumpet to brush gifts, income tens of thousands of dollars a day to the end of 2016, According to the statistics agency, the number of active users of this live broadcast software is extremely out of proportion to its investment of 1.6 billion yuan (a net loss of about 1 billion yuan), reaching only about 1.4 billion for the anchor division alone, while the profits for the zombie corps Unexpectedly, it is not a joke that the wool party breaks a listed company in minutes, as the case of the bankruptcy led by the wool party is also vivid.

Similarly, the Wool Party's preparations for the annual double 11 is no less lax than the e-commerce platform, as a professional 'wool' underground team, no one on which platform they are, what business promotions and promotions more sensitive to the first Time found that the first time committing the crime.

Tools for committing crimes: Japan into the gold behind the professional equipment

Wool party is not a prime factor, want to fight against gold also need professional crime tools.We from cheating point of view to see what things can be used to cheat:

1.1. Account

Go to a treasure on the search, each product account has a lot of wholesale will be cheaper (microblogging, WeChat, a variety of email accounts, etc.) can be used directly to purchase (provide account password), eliminating the need for registration Process.

1.2.IP

A lot of agents also have a large number of proxy IP for sale, the price is low, and even provide monthly services. Of course, write some reptiles to collect proxy IP is also OK, more cattle is to grasp some of the more convenient for chicken. Log in with different IP different Account is a good way to hide their whereabouts, usually a lot of products will do high-frequency IP restrictions (under the IP to participate in the number of users too much).

1.3. Coding platform

Picture verification code and SMS verification code already have a professional code platform. For a simple verification code, the machine can be identified (success rate is quite high), for more complex verification code, code platform support artificial fight Code, 7 * 24 hours service.

For the SMS verification code, the code platform uses its own or purchased cardholder resources to provide the corresponding api or toolkit for cheating. The tool automatically obtains the verification code received by the mobile phone number and the mobile phone number. The cheating tool can use various kinds of unused Real-name authentication of mobile phone number registered in the various e-commerce platform.Coding platform upstream card merchants actually mastered a large number of mobile phone cards, they use the cat pool and other devices to automatically receive and resolve multiple mobile phone number verification code, and the phone number And SMS verification code provided to the code platform, the ultimate cheating tools can be obtained through the code platform automatically mobile phone number and sms.

1.4. Simulator

Simulator usually refers to Andrews simulator, Andrews simulator is very powerful, many types, the basic can simulate all the features of a real phone, such as BlueStacks, etc. Even GPS, MAC address and other information can be simulated.

1.5. Professional custom tools

Hackers and technicians to write targeted tools and procedures, combined with the simulator and mentioned above, a variety of resources, you can make a full set of automated cheating tools. For example, many account registration machine, it supports replacement IP, replacement Mobile phone number, docking code platform and other functions.It is said that there are such high-end hackers upstream technology, a can support dozens of downstream production team.

The specific cheating users in an event may have several dial-up, different teams have high and low levels of cheating.The basic cheats can be combined with the number of black resources, that is cheating cost level to distinguish.For cheating users with low levels, With simple rules and means to block some of the points on it.But for clever cheating, it is difficult to use one-sided strategy to find out.So we are doing defense programs, but also need a comprehensive response, with the system The program to deal with.

Double eleven imminent, how to prevent the electricity supplier wool party?

We first came to the scene to look at the daily work of the Wool Party. The figure is a lingerie where the author of a Wool WeChat group, look out, they recently in the 'Wool' basically concentrated in the e-commerce platform , An East is also one of the committing the crime target is also a member of the group through the discount promotions e-commerce platform to share links in the group, to encourage members to bulk consumption .Buy low-cost goods, later sold through other channels at high prices, earn Take the middle of the difference. How many such "working groups" across the country we do not know, but it is clear that most of our e-commerce platform part of the interest is to be swallowed by these wool party quietly.

So in double 11, universal consumer carnival day, e-commerce platform should be how to deal with wool party?

The key to grasping the Wool Party lies in how to distinguish them from normal users' behavior.In the long-term anti-cheat service for NetEase products, NetEase Cloud Security (E-Shield) team has accumulated rich combat experience and has Have a more sophisticated anti-cheating e-commerce system.

E-commerce anti-cheating the basic principles

Since a lot of cheats are done by the program automation, then you should try to do human-machine identification.As the cheating means is varied, there is no good thing once and for all for defensive measures, but one of the basic defensive principles that can be followed is to improve the cheat cost:

2.1. Verification code

Graphic verification code is the most simple and crude human-machine identification means, once there is a verification code, Wool wool party need to increase the picture OCR technology to enhance their cheat costs.But with the current OCR technology level, For a long time, Netease cloud security (easy shield) developed a variety of new verification code, such as tow bar, puzzles, text click smart verification code, in the human-machine recognition and user experience has been a lot of users and customers Recognition.

2.2. SMS verification

Although the existence of code-coding platform, but the access also costs, and is calculated according to the number of mobile phone number, the cost is not low.Improve the cost of cheating, Wool Party will naturally find the lower cost and easier Place 薅 wool.

2.3. IP rules

IP is also a limited resource, although there are many agents selling it, but also costs. IP high-frequency limit, can be used as the most basic defensive measures.

2.4. Device ID / Browser Fingerprint

It is a very effective anti-cheat method to generate unique and stable device ID and browser fingerprints based on device characteristics and do high-frequency limitation and statistical analysis.But how to obtain the real device information (not after tampering) As well as to ensure that equipment information is not tampered with and falsified in the transmission process requires a safe and professional technical programs, and also need long-term security confrontation and technology accumulation. NetEase cloud security (Yi Shield) relies on many years of anti-cheating experience, launched a professional , Secure, secure device ID and browser fingerprinting algorithms, and use it in corporate customers' anti-cheat services.

NetEase cloud security (easy shield) relies on years of big data, cloud computing, artificial intelligence technology has formed an effective anti-cheating defense mechanism, and repeatedly escort applications in complex scenes of large-scale hidden confrontation in the electricity business, live, games The industry has accumulated a wealth of experience in confrontation, to ensure the effective conduct of large-scale marketing activities carried out smoothly, to protect the interests of consumers and businesses from infringement.

'Case':

NetEase cloud security (easy shield) anti-cheat instance analysis

The following, the author only Netease Koala sea shopping (hereinafter referred to as 'Koala') order part of the anti-cheating detection as an example, the analysis of the e-commerce Carnival Day, NetEase Cloud Security (easy shield) is how to effectively identify the wool party, Safeguard large smoothly carried out.

Currently, Koala's anti-cheat system identifies risk orders mainly based on the rules engine, and combines detection methods such as user portrait score, associated network model and business list database.

(figure 1)

However, not all orders that satisfy the rule conditions are problematic. How to exclude the normal user orders from them? In this case, we need to use the user portrait scoring model to correlate Network model and business list library to improve the accuracy of the results.

1, the rules engine

The rules engine supports the dynamic configuration of rules and real-time statistics, the system can follow the different time windows, online statistics of the orders of the rules of the characteristics of the situation and return the results in real time. The rules of the system can output two results:

a, the order data after all the rules of detection, the points of each hit rule accumulated, calculate the total score output;

b, the other is to take the highest ranking result in the hit rule.

2, user portrait

Here the user portrait is mainly in the hoarding behavior on the user portrait score, different from the average platform for the user's comprehensive credit score.We selected several dimensions, such as the user to buy the product category number, activity, gross profit contribution, Historical malicious acts, commonly used equipment, the use of statistical methods to the user to draw a comprehensive score, and then graded score range, so that all users in the hoarding behavior of the portrait score, the module can join to a large extent Improve anti-cheating system accuracy.

3, associated network model

We combine unsupervised learning with supervised learning to find out the network model of the Wool Party gang crime.First, we examine the relationship chain of all the order-related data of users in a period of time, which form a total network.Secondly, the search network , And then we traverse each sub-network to obtain the network tags and tap the network features. Finally, we construct a network model to identify the woolly party through machine learning. Figure 2 is a typical network diagram of the association.

(figure 2)

The result of the network model decision can also be combined with the rule conditions to flexibly select the most appropriate risk judgment result under different business scenarios to best meet the anti-cheating needs of each business scenario.

4, the list of libraries

Anti-cheat system list library subdivided into many types, depending on the needs of various business scenarios.For example, this year's fire fight group promotion forms in many e-commerce platform to carry out activities for the head and members of the purchase restrictions are different, This led to the head of stockpiling and member stockpile behave differently in order behavior patterns.If you want to customize the blacklist of the fight group activities, then you should make a distinction between the two to ensure that business blacklisted accurately and without injury.

In addition to the black-and-white list, there will be a gray list. Users of these gray-list users may not be able to participate in certain major profit-making activities and will intercept their risks in the forefront to ensure the smooth and smooth running of major events.

NetEase cloud security (easy shield) anti-cheating system relies on its powerful rules engine, combined with user portraits, associated network model and the business of the list of libraries, accurate and efficient identification of the wool party's stockpile behavior .This system will protect Ordinary consumers in each promotion in a fair and orderly platform to enjoy the benefits offered, enjoy buy buy.

Anti-cheating confrontation process, in essence, is a contest of cheating and defense costs. In this protracted war, the enterprises can only discourage the wool chewing costs if they continuously raise the cost of cheating.


E-business Double eleven neighbors, you gearing up in front of the computer, constantly refresh the page, ready to grab a few coupons, and I believe this collection of goods is determined to win.But when you punctually refresh, coupons or instantly disappear, beloved goods inventory Seconds have become 0. feel very depressed at the same time, you are not very puzzled: why?

Such a scene, have experienced a business partner Carnival Day may have had a small partner, but you do not know is that the same computer sitting at your speed, in addition to normal users, there are a number of professional wool party, they Harder than you, prepared for longer, and more 'professional' ... as a direct 'competitor' to snatch our benefits, it is necessary for us to get a good acquaintance with these 'familiar strangers.' Who are they and why? Why say they are not only horrible but horrible?

Crime gang: from 'corruption NGO' to 'professional underground ash production'

If you are interested in the QQ group search bar to 'wool' as the keyword search, the result may give you an eye-opener, yes, the Folk Wool Party easier to reach than you think of more, all kinds of wool The size of the organization varies in size and is clearly visible:

In the Internet marketing activities of all kinds, businesses in order to pull new, promotion, publicity and other commercial goals, there will be a variety of consumer-oriented lottery, pull the new benefits, coupons, discount vouchers and other kinds of concessions.In addition to normal consumption In addition to receiving these benefits, there are also a group of professional wool organizations and professional underground people who specialize in preferential marketing campaigns for Internet companies, register new listings, buy tickets, grab coupons and buy low prices at high prices Sell, etc., at low cost or zero cost in exchange for high rewards.We call such people as 'wool party.'

The Wool Party, which has long ceased to be as simple as a "non-governmental organization for the sake of cheapness," has formed a lucrative and well-organized organization with a high degree of organization and roughly estimates that there are hundreds of thousands of gangs in the country. From the Internet giant to the Internet giant, Down to ordinary companies, as long as the marketing activities, may face a tremendous threat to Wool Party.

So, wool party in the whirlwind?

Crime target: the main electricity supplier, O2O, mutual gold, social

Where the welfare benefits and more, where they have them.The most active platform for marketing activities, is the main target of the wool party crime, including O2O platform, e-commerce platform, social platform, Internet finance platform.

Some network loan platform to pull new users often introduce some lucrative activities, such as registration certification reward, recharge back, the tender rebate, gave birth to this parasitic P2P Wool Party in the P2P platform, a promotion from dozens From Yuan to Hundreds of Yuan, the "Wool Party" can earn tens of thousands to hundreds of thousands every month. It can be said to be "very impressive."

In this year's well-known shared cycling war, a well-known domestic shared bike has launched a 'riding collar red envelope' activities, but also encountered a situation where the Wool Party faked the address to grab a single red envelope. Wool party to use positioning to modify the software and bulk mobile phone Number of software, you can do without leaving your home cycling bike and receive their distribution of red envelopes.According to estimates, the average per person can brush about 5 red envelopes, about 16 times a day income of 80 yuan, multiple accounts bulk operations can Japan into a few million.

Accusation crime: collapse of listed companies is not alarmist

In addition to the damage to the welfare of normal users, Wool Party more harm or the invisible swallowing of the interests of enterprises.Woman party split minute a listed company is not never happened.

In recent years, only two years of live video fire as an example.According to media research, in August 2016, a wholly owned subsidiary of a listed company push live software, as long as the registration of the live broadcast every day for 10 minutes, the first day of 30 yuan, 30 yuan the next day, the third day or 30 yuan, 10 yuan a day later, and the next day you can withdraw now with a single account anchor, the other trumpet to brush gifts, income tens of thousands of dollars a day to the end of 2016, According to the statistics agency, the number of active users of this live broadcast software is extremely out of proportion to its investment of 1.6 billion yuan (a net loss of about 1 billion yuan), reaching only about 1.4 billion for the anchor division alone, while the profits for the zombie corps Unexpectedly, it is not a joke that the wool party breaks a listed company in minutes, as the case of the bankruptcy led by the wool party is also vivid.

Similarly, the Wool Party's preparations for the annual double 11 is no less lax than the e-commerce platform, as a professional 'wool' underground team, no one on which platform they are, what business promotions and promotions more sensitive to the first Time found that the first time committing the crime.

Tools for committing crimes: Japan into the gold behind the professional equipment

Wool party is not a prime factor, want to fight against gold also need professional crime tools.We from cheating point of view to see what things can be used to cheat:

1.1. Account

Go to a treasure on the search, each product account has a lot of wholesale will be cheaper (microblogging, WeChat, a variety of email accounts, etc.) can be used directly to purchase (provide account password), eliminating the need for registration Process.

1.2.IP

A lot of agents also have a large number of proxy IP for sale, the price is low, and even provide monthly services. Of course, write some reptiles to collect proxy IP is also OK, more cattle is to grasp some of the more convenient for chicken. Log in with different IP different Account is a good way to hide their whereabouts, usually a lot of products will do high-frequency IP restrictions (under the IP to participate in the number of users too much).

1.3. Coding platform

Picture verification code and SMS verification code already have a professional code platform. For a simple verification code, the machine can be identified (success rate is quite high), for more complex verification code, code platform support artificial fight Code, 7 * 24 hours service.

For the SMS verification code, the code platform uses its own or purchased cardholder resources to provide the corresponding api or toolkit for cheating. The tool automatically obtains the verification code received by the mobile phone number and the mobile phone number. The cheating tool can use various kinds of unused Real-name authentication of mobile phone number registered in the various e-commerce platform.Coding platform upstream card merchants actually mastered a large number of mobile phone cards, they use the cat pool and other devices to automatically receive and resolve multiple mobile phone number verification code, and the phone number And SMS verification code provided to the code platform, the ultimate cheating tools can be obtained through the code platform automatically mobile phone number and sms.

1.4. Simulator

Simulator usually refers to Andrews simulator, Andrews simulator is very powerful, many types, the basic can simulate all the features of a real phone, such as BlueStacks, etc. Even GPS, MAC address and other information can be simulated.

1.5. Professional custom tools

Hackers and technicians to write targeted tools and procedures, combined with the simulator and mentioned above, a variety of resources, you can make a full set of automated cheating tools. For example, many account registration machine, it supports replacement IP, replacement Mobile phone number, docked code platform and other functions.It is said that such a high-end technology hacker upstream, a can support dozens of downstream production team.

The specific cheating users in an event may have several dial-up, different teams have high and low levels of cheating.The basic cheats can be combined with the number of black resources, that is cheating cost level to distinguish.For cheating users with low levels, With simple rules and means to block some of the points on it.But for clever cheating means, it is difficult to use one-sided strategy to find out.So we are doing the defense program, but also need a comprehensive response, with the system The program to deal with.

Double eleven imminent, how to prevent the electricity supplier wool party?

We first came to the scene to look at the daily work of the Wool Party. The figure is a lingerie where the author of a Wool WeChat group, look out, most recently, their 'Wool' basically concentrated in the e-commerce platform , An East is also one of the committing the crime target is also a member of the group through the discount promotions e-commerce platform to share links in the group, to encourage members to bulk consumption .Buy low-cost goods, later sold through other channels at high prices, earn Take the middle of the difference. How many such "working groups" across the country we do not know, but it is clear that most of our e-commerce platform part of the interest is to be swallowed by these wool party quietly.

So in double 11, universal consumer carnival day, e-commerce platform should be how to deal with wool party?

The key to grasping the Wool Party lies in how to distinguish them from normal users' behavior.In the long-term anti-cheat service for NetEase products, NetEase Cloud Security (E-Shield) team has accumulated rich combat experience and has Have a more sophisticated anti-cheating e-commerce system.

E-commerce anti-cheating the basic principles

Since a lot of cheats are done by the program automation, then you should try to do human-machine identification.As the cheating means is varied, there is no good thing once and for all for defensive measures, but one of the basic defensive principles that can be followed is to improve the cheat cost:

2.1. Verification code

Graphic verification code is the most simple and crude human-machine identification means, once there is a verification code, Wool Wool wool need to increase the picture OCR technology to enhance their cost of cheating.But with the current OCR technology, graphics verification code For a long time, Netease cloud security (easy shield) developed a variety of new verification code, such as tow bar, puzzles, text click smart verification code, in the human-machine recognition and user experience has been a lot of users and customers Recognition.

2.2. SMS verification

Although the existence of code-coding platform, but the access also costs, and is calculated according to the number of mobile phone number, the cost is not low.Improve the cost of cheating, Wool Party will naturally find the lower cost and easier Place 薅 wool.

2.3. IP rules

IP is also a limited resource, although there are many agents selling it, but also costs. IP high-frequency limit, can be used as the most basic defense.

2.4. Device ID / Browser Fingerprint

It is a very effective anti-cheat method to generate unique and stable device ID and browser fingerprints based on device characteristics and do high-frequency limitation and statistical analysis.But how to obtain the real device information (not after tampering) As well as to ensure that equipment information is not tampered with and falsified in the transmission process requires a safe and professional technical programs, and also need long-term security confrontation and technology accumulation. NetEase cloud security (Yi Shield) relies on many years of anti-cheating experience, launched a professional , Secure, secure device ID and browser fingerprinting algorithms, and use it in corporate customers' anti-cheat services.

NetEase cloud security (easy shield) relies on years of big data, cloud computing, artificial intelligence technology has formed an effective anti-cheating defense mechanism, and repeatedly escort applications in complex scenes of large-scale hidden confrontation in the electricity business, live, games The industry has accumulated a wealth of experience in confrontation, to ensure the effective conduct of large-scale marketing activities carried out smoothly, to protect the interests of consumers and businesses from infringement.

'Case':

NetEase cloud security (easy shield) anti-cheat instance analysis

The following, the author only Netease Koala sea shopping (hereinafter referred to as 'Koala') order part of the anti-cheating detection as an example, the analysis of the e-commerce Carnival Day, NetEase Cloud Security (easy shield) is how to effectively identify the wool party, Safeguard large smoothly carried out.

Currently, Koala's anti-cheat system identifies risk orders mainly based on the rules engine, and combines detection methods such as user portrait score, associated network model and business list database.

(figure 1)

However, not all orders that satisfy the rule conditions are problematic. How to eliminate the normal user orders? At this time, we need to use the user portrait scoring model, Network model and business list library to improve the accuracy of the results.

1, the rules engine

The rules engine supports the dynamic configuration of rules and real-time statistics, the system can follow the different time windows, online statistics of the orders of the rules of the characteristics of the situation and return the results in real time. The rules of the system can output two results:

a, the order data after all the rules of detection, the points of each hit rule accumulated, calculate the total score output;

b, the other is to take the highest ranking result in the hit rule.

2, user portrait

Here the user portrait is mainly in the hoarding behavior on the user portrait score, different from the average platform for the user's comprehensive credit score.We selected several dimensions, such as the user to buy the product category number, activity, gross profit contribution, Historical malicious acts, commonly used equipment, the use of statistical methods to the user to draw a comprehensive score, and then graded score range, so that all users in the hoarding behavior of the portrait score, the module can join to a large extent Improve anti-cheating system accuracy.

3, associated network model

We combine unsupervised learning with supervised learning to find out the network model of the Wool Party gang crime.First, we examine the relationship chain of all the order-related data of users in a period of time, which form a total network.Secondly, the search network , And then we traverse each sub-network to obtain the network tags and tap the network features. Finally, we build a network model to identify the Wool Party through machine learning. Figure 2 is a typical network diagram.

(figure 2)

The result of the network model decision can also be combined with the rule conditions to flexibly select the most appropriate risk judgment result under different business scenarios to best meet the anti-cheating needs of each business scenario.

4, the list of libraries

Anti-cheat system list library subdivided into many types, depending on the needs of various business scenarios.For example, this year's fire fight group promotion forms in many e-commerce platform to carry out activities for the head and members of the purchase restrictions are different, This led to the head of stockpiling and member hoarding behavior in the order behavior pattern is not the same.If you want to customize the blacklist fight activities, it should make a distinction between the two to ensure that the blacklist of business is accurate and flawless.

In addition to the black-and-white list, there will be a gray list. Users of these gray-list users may not be able to participate in certain major profit-making activities and will intercept their risks in the forefront to ensure the smooth and smooth running of major events.

NetEase cloud security (easy shield) anti-cheating system relies on its powerful rules engine, combined with user portraits, associated network model and the list of each business, accurate and efficient identification of the wool party's stockpile behavior .This system will protect Ordinary consumers in each promotion in a fair and orderly platform to enjoy the benefits provided, enjoy buy buy.

Anti-cheating confrontation process, in essence, is a contest of cheating and defense costs. In this protracted war, the enterprises can only discourage the wool chewing costs if they continuously raise the cost of cheating.

2016 GoodChinaBrand | ICP: 12011751 | China Exports