What if the operator plays rascal and the traffic is hijacked

 What if the operator plays rascal and the traffic is hijacked Original title: What should I do if the operator plays rascal and the traffic is hijacked

Reading guide:

To my surprise, in the domestic network environment, the biggest threat to security comes from the operators who make Internet companies dare to be angry. On December 25, 2015, Tencent, Xiaomi, 360, Today Toutiao, Meituan Dianping.com, and Weibo released a joint voice

To my surprise, in the domestic network environment, the biggest threat to security comes from the operators who make Internet companies dare to be angry. On December 25, 2015, Tencent, Xiaomi, 360, Today Toutiao, Meituan Dianping.com, and Weibo issued a joint statement calling for the fight against traffic hijacking. Although the statement only dares to say that "some institutions" hijack traffic, industry insiders know who "some institutions" are and how bold they are to play rascals.

 What to do if hijacked by the operator. jpg

Almost every user has encountered that a web page opened by mobile phone is forcibly inserted into a business order menu or an illegal pop-up advertisement by China Mobile, China Unicom or China Telecom. Even the page opened in WeChat is doomed. These inexplicable menus and pop-up ads not only seriously affect the normal browsing experience of users, but also confuse users and worry about their privacy being disclosed by the website they are visiting. Not everyone knows that these contents are actually implemented by operators who openly inject their own code into other people's websites.

Industry insiders complained on the network that "since the second half of 2015, the traffic hijacked by operators has arrived It's appalling. It's hard to believe how many percent of the traffic of a nationally famous website has been hijacked, and it's hard to believe that more than 50% of users' complaint calls are due to the good deeds of operators. " I'm afraid it's even more incredible that an operator has named this business as the push advertising of iPush, boldly attracting investment and attracting advertisers.

This station has Enable HTTPS in the whole site He Mingke, a netizen, explained the difference between http and https in popular language, and also expressed the helplessness of Internet companies.

Internet companies are like Taobao merchants, operators are like express companies, and users are like buyers who need to cut their hands. Moreover, the express company is still monopolized, and there are few choices in the country. In the past, when using the http protocol, the Internet company sent goods to users, but randomly selected a package and asked the operator to distribute it to users. For its own benefit, the operator company opened the package and filled it with various advertisements. It is even possible that the user will buy a book and the carrier will pack a whole box of leaflets or small cards into the package and send them to the store. It may even be the card below.

 Various Ads.jpg

Now we start to use the https protocol. Internet companies send goods to users, but this time they choose a safe box to send goods to users. The unpacking password is told to users through another channel, and then operators are asked to deliver goods to users. Although the cost is much higher, it is finally safe.

Several technical personnel from front-line Internet companies have similar views on this: operators are playing hooliganism more and more seriously, which is the biggest driving force for major domestic websites to turn to https technology in an all-round way. This technology, developed to protect website data security, has become a counterattack of Chinese Internet companies against operators who threaten website security and their own interests. At the same time, the maturity of technology and the reduction of technology implementation cost also objectively promote the popularization of https technology in the whole site.

In this way, operators have done a good deed, prompting more large and medium-sized Internet companies to make up their minds to transform the website architecture, build a defense fortification that should have been started long ago, to resist rogue operators with evil intentions, as well as possible illegal intruders in the future.

Finally, let me tell you a secret. It is said that when you use traffic to surf the Internet on your mobile phone, you can search "What to do if you are hijacked by an operator" to avoid the operator's forced insertion of advertisements. Many netizens said that it was really effective. Why? Maybe it is because some local operators with conscience left this bug on purpose.

Back to list
Previous:
Next:
    Comment List (Already three Of comments four thousand and sixteen Participation) Participate in the discussion
     Netizen nickname: Lei Xuesong, PHP programmer
    2017-03-28 reply
    Now traffic is money!
     Netizen nickname: Ningbo Flower Rental
    Ningbo flower rental tourist chair
    2017-03-16 reply
    Traffic is the root of website operation
     Netizen nickname: vultr discount code
    Vultr discount code tourist sofa
    2017-03-10 reply
    Now operators make money by traffic