|
Post by j7oyun55rruk on Dec 26, 2023 17:52:58 GMT 10
When adding a phone number to contacts, the The entered data is matched to user accounts. That is, add a person's number in your address book, and you can write to him in it. This is what the Hong Kong authorities are using to de-anonymize protesters. According to Alexander Ognev, special groups were then created that added protesters to their contacts by brute force and compared them with real people. This method requires a lot of resources. How does Messenger bypass content blocking. Modern political realities have added new standards to instant messengers. Many countries C Level Contact List have begun to regulate content posted on the global web. China has built a great Great Firewall, Russia has passed laws, and other countries are adopting regional approaches to segregate traffic and control content. Given this, providers are forced to find ways to block content. In particular, a law passed in Russia in 2009 requires telecom operators to store records of customers. Phone calls and Internet traffic on their servers for six months, and to be able to transmit this data to FSB. Management said these requirements are not technically feasible because the keys are stored on the user's device and the courier will not receive them. Afterwards, a block on the messenger was initiated. To circumvent it, masquerading its connections as network device traffic, these services are hosted on servers of well-known providers.
|
|