Set micro-network messages (text/Luoming)On June 12th, Vivo released its new product vivo NEX in Shanghai. It boasts a number of selling points, such as a zero-screen full-screen screen, a lifting front camera, etc., especially innovative use of a lifting camera, which eliminates annoying bangs. Screen ratio is extremely high and everyone is stunned.
In the early morning of June 20th, OPPO officially released Find X at the Louvre in Paris, France. The product has an innovative design and technology sense. The screen reaches 6.42 inches, with 93.8% of the screen's highest screen share, creating a unique frame. Hidden front camera and 3D sensing solution. Shocked everyone again.
Due to the innovative design of the front camera by OV Dachang, the flagship of their flagship cameras is surprisingly high. Some Liu Haiping's mobile phones are not self-contained, some are recycled into the furnace, and some are reported to be released in advance.
In addition, for the rogue rights APP, the flagship that met the OV also succeeded, because their handling of the front camera made rogue permissions apps that wanted to do bad things to be nothing.
Users who have used the vivo NEX have found that when they are using their mobile phones, they often do not take self-portraits. The camera will rise to see you and then silently retract them. At first, it was thought that it was a mobile phone failure. Later, it was discovered that there were certain The camera's permission app can sneak the surrounding environment from time to time without the user's knowledge.
However, ordinary mobile phone people can not find the camera secretly start and shut the moment, vivo's NEX, suddenly became those rogue APP appraisers. Imagine you lying in bed, forget to play with the phone, this time the camera suddenly secretly 5. Hold it out, look at you silently, then retract it. This feeling is not very microseconds.
OPPO Find X, which is about to be released in the country, is also an artifact for authenticating rogue privilege APPs. Since the dual-rail periscope structure is adopted, the camera is hidden inside the mobile phone, and only when the user needs to take a photo or unlock, the seconds are solved secondarily, and the homing is automatically performed after the operation is completed. In other words, if the rogue permission APP wants to call the OPPO Find X camera (whether it is the front or the back camera), it will be discovered by the user due to the design of the mobile phone. I don’t know the OPPO’s 300,000 lens lift life. I can't afford to toss the rogue permissions APP.
Governance rogue permissions APP or OV flagship design is superior, after all, APP sneaky behavior is visualized.