Lixinjack

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality(2022) Trans

摘要 每年都有越来越多的用户在手机上遇到跟踪软件 [84]。他们中的许多人是亲密伴侣监视 (IPS) 的受害者,他们不确定如何从手机中识别或删除跟踪软件 [49]。一种直观的方法是从应用商店中选择反跟踪软件。然而,用户期望和技术能力之间的不匹配会产生安全和风险补偿行为的错觉(即佩尔兹曼效应)。我们将用户对反跟踪软件的看法与技术现实进行比较。首先,我们将主题分析应用于应用评论,以分析用户的看法。然后,我们对 Google Play 商店中两个著名的反跟踪软件应用程序进行了认知演练,并对它们进行了逆向工程以了解它们的检测功能。我们的结果表明,用户的信任基于应用程序的外观和感觉、警报的数量和类型以及应用程序的功能。我们还发现,应用功能与用户的感知和期望不符,影响了他们的实际效果。我们讨论了不同利益相关者的选择,以解决这些挑战并更好地将用户感知与技术现实保持一致。 1.介绍 大约五分之一的成年人,甚至更多的年轻人参与窥探他人手机的攻击 [54]。亲密伴侣监视 (IPS) 是这些攻击的一个特定子集 [13, 88]。基于工具的 IPS 通常涉及一种间谍软件,称为跟踪软件(或监视软件),用于实时收集根据反跟踪软件联盟 [84],2019 年有 67,500 名移动用户面临跟踪软件,与一年前。兰德尔等人。 [76] 估计,从 2020 年 3 月到 2020 年 5 月,美国至少有 5,758 人成为公开跟踪软件的目标。他们研究的 22 个应用程序中有两个可在 Google Play 商店中获得,其余的只能从第三方获得。 2020 年 10 月,谷歌禁止其商店中的监控应用程序 [37] 现在只允许在家长控制和企业管理应用程序中进行监视,前提是它们不隐藏或混淆其监视实践。因此,stalkerware 经常将自己重新命名为家长控制应用程序或转移到第三方网站。临床计算机安全 [43] 咨询中出现的大多数跟踪软件都包含此类“双重用途”应用程序 [15]。对在线家庭虐待论坛的分析和对跟踪软件应用程序 (app) 行业的评估发现,IPS 幸存者不确定如何识别和删除跟踪软件 [49, 66]。从 Google …

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality(2022) Trans Read More »

Tweepy, an easy way to collect tweets

Document{} Details about the parameters of Client.search_all_tweets: query – the keyword to search for end_time and start_time – end time and start time, it is required to follow the RFC 3339 time format expansions, media_fields, place_fields, poll_fields, tweet_fields, user_fields – these are additional information for tweets, which can be selected as needed. since_id, until_id – …

Tweepy, an easy way to collect tweets Read More »

10  Important Concepts For Coding (algorithms and data structures)

The logarithm the math concept Understand how the logarithm works Why a logarithmic time operation or algorithm is so much faster and therefore better than a linear time algorithm or operation? 2. Graph traversal Pre-traversal, matrix traversal (because matrices are basically kind of like graphs in a way. You have to know how to do …

10  Important Concepts For Coding (algorithms and data structures) Read More »

An easy way to use AES to encryption in python

Pycrypto. Which is very useful. link: https://pypi.org/project/pycrypto Python Cryptography Toolkit (pycrypto) This is a collection of both secure hash functions (such as SHA256 and RIPEMD160), and various encryption algorithms (AES, DES, RSA, ElGamal, etc.). The package is structured to make adding new modules easy. This section is essentially complete, and the software interface will almost …

An easy way to use AES to encryption in python Read More »

How to get Roblox open source game code

Steps to port the game: Double-click on rbxlx-to-rojo on wherever you installed it. Select the .rbxl file you saved earlier. Now, select the folder that you just created. If you followed the steps correctly, you should see something that looks like this:  View and download from Github: https://github.com/rojo-rbx/rbxlx-to-rojo link2: https://github.com/xinli2/rbxlx-to-rojo

Sandbox

What is a sandbox? There are many reasons why the iOS system is more secure than the Android (or Windows) system. One of them is the sandbox mechanism introduced by Apple. Each application has its own corresponding sandbox, and each application cannot access each other. It is not the sandbox of this program. Therefore, the …

Sandbox Read More »

The time complexity of map_Improve the efficiency of code operation – the magic use of Map

Multiple nested for loops are too ugly and inefficient. Is there any way to reduce the number of nested levels? How can I get the data I want concisely and elegantly in the game, and have a good smart prompt effect? Is there a general solution to improve operational efficiency? That’s right, es6’s Map is …

The time complexity of map_Improve the efficiency of code operation – the magic use of Map Read More »

Scroll to Top