Physical Lift + Limitation Vivo NEX Privacy Protection Artifact

Recently, in addition to the popular topic of the World Cup, another hot spot in the mobile phone and digital circle is caused by the form of mobile phone that vivo is exploring.

In order to achieve a 91.24% screen-wide full-screen full screen on vivo NEX, the vivo adopts a liftable and concealable front camera design, which uses a micro-motor to drive the lifting module, which only rises when needed.

It is this special structure that makes the operation of the application calling camera no longer invisible. Some NEX users find that some programs will have a camera rise when they are not taking photos or scanning the code, which includes QQ browser and well-known encrypted chat software Telegram.

In fact, in some cases, there are comprehensible reasons for applying the trigger camera. For example, when you first enter an APP or use an APP to take photos or scan the code for the first time, the program will confirm whether you have obtained the corresponding permission, and may touch it. The camera, placed in the vivo NEX with physical signs, there is a rise of the front camera, and this is why users generally feedback the camera is secretly stretched out half of the head and directly retracted, because the program does not take pictures .

But if the program does have unnecessary permission to acquire and take photos, then the user's privacy does not necessarily guarantee security. Imagine having a stare at your eyes at work, or you are browsing the business at work. Mail, pick up the phone back to a message, the camera took pictures of your computer screen, which is too horrible.

It is precisely because of the importance of privacy protection to users, QQ browser responded at the first time, issued a statement that the QQ browser did not use the camera to steal the user's privacy, just call the relevant API when the camera parameters are obtained in the function The process triggered the front camera response, resulting in the camera 'lifting' action on the vivo NEX.

The statement is well-founded, and we sometimes need features such as scan code, plus indirect proof of the camera that is not fully raised, basically can confirm that the QQ browser does not steal user privacy. But this does not trigger our more Think more, big companies like QQ, technical standards are relatively complete, can respond positively when problems arise, but more ill-conceived tumor applications? Some developers, though unintentional, but because of lack of awareness or level, In the application, I accidentally added too many unnecessary permissions to the app? Can we just choose to put our privacy on a position that may be exposed at any time for the convenience of scanning the code?

NEX will tell you, no, Vivo tries to maintain a good balance between keeping users' convenience experience and protecting users' privacy from being violated. On NEX, Vivo has completed this through two skills: soft and hard. Task.

The hardware part I believe you have already guessed - the lift front camera, because of physical isolation, vivo NEX can ensure that the front camera is aware of each photo when shooting each photo, not like ordinary mobile phones, The front camera is completely unintelligible. If you don't even know if you are photographed, let's decide what the photo is for.

On the software side, I have to talk about the latest system update of vivo NEX. This update includes a lot of enhancements to AI and camera functions, including the addition of driving mode, and the addition of translation function to AI Wisdom. Photographing adds AI scene recognition switch and portrait light effect mode. But what is more relevant to what we are talking about now is to strengthen the calling logic of the third-party application calling camera and microphone, when adding potential unidentified calling behavior, Will have a reminder to the user, for secondary confirmation and authorization.

In addition to the camera, vivo's permission management of the microphone has also been strengthened. When the right is turned off, the mobile phone is disconnected and listens to two ways to secretly collect the privacy of the user, and the key lies in the occurrence of a potential unknown call. When acting, this avoids the squandering of food, and does not become a call for a reasonable privilege.

And according to the small series of measurements, after the upgrade, unlike most manufacturers' rude camera rights management, vivo NEX has achieved separate control of the front and rear cameras. Just need to scan a code, then open the application's rear camera permissions separately, The pre-privilege is closed, see how you still secretly observe me.

As for the microphone, the same as the permission management, there are many details of the reminder, such as the background of the recording program, no matter what interface, the top of the screen will flash a red prompt bar to ensure that the user knows.

The first one on the left is the background to open the system recording APP and then switch to the desktop. There are related reminders. After clicking the prompt bar, it will jump directly to the recording interface. The second two are the performance of the third-party recording function application, switch to the desktop. There is also a flashing reminder bar. Clicking on the reminder bar here will have a secondary operation menu popping up. You can choose to close the application or always disable it. Even if there are some applications that do not have desktop icons and operation interfaces after secret installation, I would like to protect them in NEX. Under the eavesdropping of the surrounding information.

In the era of mobile Internet popularization, some users may feel that their privacy has long since disappeared. The practice of accepting privacy for convenience also chooses to accept by default, but in fact, information that you think is not important may be hidden. Unusually important information, especially for staff, some commercial information is also at risk of being leaked, and you may never know how they will be used and how they will be lost.

In vivo here, we see that convenience and privacy are not necessarily two extremes. If application developers and mobile phone manufacturers can really pay attention to it, there must be ways to protect everyone's privacy while ensuring relative convenience. It is absolutely irresponsible to leave the multiple-choice questions such as privacy and convenience without any measures and throw them directly to the users. I hope that each manufacturer can quickly follow up and strengthen privacy protection, even if It can't have the same physical security as NEX, and its software control is also worth learning.

Finally, I would like to say that the broken cans think that their information is not important at all, but they don’t realize the importance of their information. The danger of privacy leakage is absolutely not to be underestimated. You still don’t pay attention to it. Because the harm does not happen by chance. Students who are interested in checking can know that the cost of obtaining a user with relatively complete information is not low. This has already explained the value of your information, not to mention. If you fall into the hands of people with ulterior motives, this information may be the beginning of fraud, you can guarantee that you are not easily fooled, can ensure that people around you are not deceived because of this information.


Recently, in addition to the popular topic of the World Cup, another hot spot in the mobile phone and digital circle is caused by the form of mobile phone that vivo is exploring.

In order to achieve a 91.24% screen-wide full-screen full screen on vivo NEX, the vivo adopts a liftable and concealable front camera design, which uses a micro-motor to drive the lifting module, which only rises when needed.

It is this special structure that makes the operation of the application calling camera no longer invisible. Some NEX users find that some programs will have a camera rise when they are not taking photos or scanning the code, which includes QQ browser and well-known encrypted chat software Telegram.

In fact, in some cases, there are comprehensible reasons for applying the trigger camera. For example, when you first enter an APP or use an APP to take photos or scan the code for the first time, the program will confirm whether you have obtained the corresponding permission, and may touch it. The camera, placed in the vivo NEX with physical signs, there is a rise of the front camera, and this is why users generally feedback the camera is secretly stretched out half of the head and directly retracted, because the program does not take pictures .

But if the program does have unnecessary permission to acquire and take photos, then the user's privacy does not necessarily guarantee security. Imagine having a stare at your eyes at work, or you are browsing the business at work. Mail, pick up the phone back to a message, the camera took pictures of your computer screen, which is too horrible.

It is precisely because of the importance of privacy protection to users, QQ browser responded at the first time, issued a statement that the QQ browser did not use the camera to steal the user's privacy, just call the relevant API when the camera parameters are obtained in the function The process triggered the front camera response, resulting in the camera 'lifting' action on the vivo NEX.

The statement is well-founded, and we sometimes need features such as scan code, plus indirect proof of the camera that is not fully raised, basically can confirm that the QQ browser does not steal user privacy. But this does not trigger our more Think more, big companies like QQ, technical standards are relatively complete, can respond positively when problems arise, but more ill-conceived tumor applications? Some developers, though unintentional, but because of lack of awareness or level, In the application, I accidentally added too many unnecessary permissions to the app? Can we just choose to put our privacy on a position that may be exposed at any time for the convenience of scanning the code?

NEX will tell you, no, Vivo tries to maintain a good balance between keeping users' convenience experience and protecting users' privacy from being violated. On NEX, Vivo has completed this through two skills: soft and hard. Task.

The hardware part I believe you have already guessed - the lift front camera, because of physical isolation, vivo NEX can ensure that the front camera is aware of each photo when shooting each photo, not like ordinary mobile phones, The front camera is completely unintelligible. If you don't even know if you are photographed, let's decide what the photo is for.

On the software side, I have to talk about the latest system update of vivo NEX. This update includes a lot of enhancements to AI and camera functions, including the addition of driving mode, and the addition of translation function to AI Wisdom. Photographing adds AI scene recognition switch and portrait light effect mode. But what is more relevant to what we are talking about now is to strengthen the calling logic of the third-party application calling camera and microphone, when adding potential unidentified calling behavior, Will have a reminder to the user, for secondary confirmation and authorization.

In addition to the camera, vivo's permission management of the microphone has also been strengthened. When the right is turned off, the mobile phone is disconnected and listens to two ways to secretly collect the privacy of the user, and the key lies in the occurrence of a potential unknown call. When acting, this avoids the squandering of food, and does not become a call for a reasonable privilege.

And according to the small series of measurements, after the upgrade, unlike most manufacturers' rude camera rights management, vivo NEX has achieved separate control of the front and rear cameras. Just need to scan a code, then open the application's rear camera permissions separately, The pre-privilege is closed, see how you still secretly observe me.

As for the microphone, the same as the permission management, there are many details of the reminder, such as the background of the recording program, no matter what interface, the top of the screen will flash a red prompt bar to ensure that the user knows.

The first one on the left is the background to open the system recording APP and then switch to the desktop. There are related reminders. After clicking the prompt bar, it will jump directly to the recording interface. The second two are the performance of the third-party recording function application, switch to the desktop. There is also a flashing reminder bar. Clicking on the reminder bar here will have a secondary operation menu popping up. You can choose to close the application or always disable it. Even if there are some applications that do not have desktop icons and operation interfaces after secret installation, I would like to protect them in NEX. Under the eavesdropping of the surrounding information.

In the era of mobile Internet popularization, some users may feel that their privacy has long since disappeared. The practice of accepting privacy for convenience also chooses to accept by default, but in fact, information that you think is not important may be hidden. Unusually important information, especially for staff, some commercial information is also at risk of being leaked, and you may never know how they will be used and how they will be lost.

In vivo here, we see that convenience and privacy are not necessarily two extremes. If application developers and mobile phone manufacturers can really pay attention to it, there must be ways to protect everyone's privacy while ensuring relative convenience. It is absolutely irresponsible to leave the multiple-choice questions such as privacy and convenience without any measures and throw them directly to the users. I hope that each manufacturer can quickly follow up and strengthen privacy protection, even if It can't have the same physical security as NEX, and its software control is also worth learning.

Finally, I would like to say that the broken cans think that their information is not important at all, but they don’t realize the importance of their information. The danger of privacy leakage is absolutely not to be underestimated. You still don’t pay attention to it. Because the harm does not happen by chance. Students who are interested in checking can know that the cost of obtaining a user with relatively complete information is not low. This has already explained the value of your information, not to mention. If you fall into the hands of people with ulterior motives, this information may be the beginning of fraud, you can guarantee that you are not easily fooled, can ensure that people around you are not deceived because of this information.

2016 GoodChinaBrand | ICP: 12011751 | China Exports