Do hackers leak other people s privacy? Will hackers send someone else s browsing history to someone

Updated on technology 2024-06-25
11 answers
  1. Anonymous users2024-02-12

    Under normal circumstances, no, hackers are at most stealing other people's privacy. But basically, I don't want to reveal what other people mean. But if there's no privacy on your phone or computer, there's nothing to leak.

  2. Anonymous users2024-02-11

    There's no need to worry at all, if the hacker is really idle and steals your privacy**and**, then he knows all your information, why should the hacker choose an ordinary person? Wouldn't it be more threatening to steal the privacy of some of the wealthier people, and there would be more to be gained by spending the same amount of time stealing information. Also, if you do have some unsolvable problems with hackers, then that's a different story.

    If you are threatened, do not hesitate to call the police.

  3. Anonymous users2024-02-10

    Of course, the most common method is to use a search engine to search for your own relevant information, such as name, QQ, mobile phone, email, network ID and other information, and try to collect information association, if the information is strongly correlated, the more serious the information leakage. Of course, you can also use the existing social worker database to visually see the extent of your information leakage.

  4. Anonymous users2024-02-09

    Possibly, it depends on whether the hacker has professional ethics, and if it is illegal and criminal, he will do anything. But the average hacker will not be able to attack an unfamiliar person.

  5. Anonymous users2024-02-08

    It's hard to say about this, since it's a hacker, then, she is extremely damaging to your privacy, so I think you should be cautious.

  6. Anonymous users2024-02-07

    Hackers also need to look at your information, and whether it can be valuable or valuable should do the same.

  7. Anonymous users2024-02-06

    Theoretically, yes, depending on the security factor of your router, and the complexity of your password setting, if the hacker just wants to attack you, he can do the analysis, because the home wireless network is a public network, without any encryption, only encrypted on the router side, the security factor is low, if you pay special attention to privacy, you can apply to do LAN.

  8. Anonymous users2024-02-05

    If it's a hacker, it's very likely that there are a lot of hackers who are trying to survive by blackmailing, specifically to obtain your privacy, and then come to ask for money, if you don't give it, you may send your privacy to the people around you or sell it, but it is not excluded that it will not be deleted after giving money.

    First, pay attention to whether there is an abnormality in your phone. When people use mobile phones, if the mobile phone consumes a lot of data traffic under normal use, and there will often be inexplicable Caton, the appearance of this abnormal phenomenon is likely to be the evidence that some third-party software consumes traffic behind it, so if the customer encounters this situation, he should check his mobile phone in time, or find a professional person to check.

    The second point is that for the software that needs to obtain permissions, you must click on the relevant instructions, and you must choose to refuse some permissions that are not necessary to obtain.

    After all, the acquisition of permissions will give these software the opportunity to obtain user information to a large extent, so if you refuse to obtain permissions, users will also protect their personal privacy information to a certain extent.

    The third point is that during the use of the mobile phone, do not easily click on unfamiliar links. Because there will be some third-party plug-ins behind these unfamiliar ** links, if you click on these links, you are likely to be spied on.

    When the user's own mobile phone is lent to others, he must not leave his sight, and do not easily lend his mobile phone to others, which is also to better protect his own information.

  9. Anonymous users2024-02-04

    Summary. What happens if personal information is leaked to hackers.

    Hacker is a Chinese word for reed, all derived from English hacker, with the emergence of the gray pigeon, the gray pigeon has become a lot of hacking techniques that control other people's computers in the name of hackers, so there is a "hacker" and"Hackers"Separation. In 2012, the movie "Hacker" produced by the Movie Channel Program Center also began to use the word hacker, showing the convergence of Chinese usage habits. In fact, hackers (or hackers) and the original English words hacker, cracker and other meanings can be completely translated, which is the difference between the development of Chinese and English language words.

    It's address book information, album information, or something.

    If it is leaking other people's information, it needs to be characterized according to the behavior of the hacker, and if it is your own information, you are responsible.

    I know, I'm asking, what are the consequences of this information being known.

    The results cannot be determined by the course of events, but by the impact of events.

    I don't know what the consequences will be.

    I don't know what people will do when they know your information.

    On which album information do you have Circle of friends rough land QQ space is not a lot of friends on your address book information Crack which app you can't get What's strange and make the stool Huai worried.

    Hackers aren't that boring, I just want to say that your information is going to be cracked, it's really a minute.

    It's like a dirt bun.

    If someone sends you your address book information, the information of the Zheng Book, and your detailed address, are you afraid? I'm not bored and worried, someone stole my number.

    I'm not afraid that this information can be easily looked up.

    How to check? Can you teach me brother, I study literature, I really don't understand technology.

    Stealing numbers is the file number of the thief, and each of them has a mobile phone number, an email address, and even an ID card information, which is not the same as the photo album and address book.

    Address book information, photo album information belong to personal public information, mobile phone number, ID card is private confidential information, and the two are not the same at all.

    No way. Don't let you talk privately.

    Leaking personal information is a serious crime, and the risk of the other party is higher than yours, and you can choose to deal with it.

    The more nervous and scared you are, the more proud the other person becomes, the less you care, the more jealous the other person becomes.

    What age are you afraid of **** Information leakage You are not an important person When the time comes, call him compensation enough for him to drink a pot.

  10. Anonymous users2024-02-03

    If the computer is invaded and privacy is leaked, and the infringer can be determined, the infringed party may file a lawsuit in court. Intruding into another person's computer is an illegal act, and if the circumstances are serious, it will constitute the crime of illegal intrusion into a computer network. If you violate the Public Security Administration Punishment Law, you will be detained for up to 5 days; where the circumstances are more serious, they are to be detained for between 5 and 10 days.

    [Legal basis].

    Article 42 of the Law on Public Security Administration Punishments.

    Those who commit any of the following acts are to be detained for up to 5 days; where the circumstances are more serious, they are to be detained for between 5 and 10 days.

    1) Violating state provisions by invading computer information systems, causing harm;

    2) Violating state provisions by deleting, modifying, adding, or interfering with the functions of computer information systems, causing computer information systems to not operate normally;

    3) Violating state provisions by deleting, modifying, or adding to data and applications stored, processed, or transmitted in computer information systems;

    4) Intentionally creating or disseminating computer viruses or other destructive programs, impacting the normal operation of computer information systems.

  11. Anonymous users2024-02-02

    Summary. First of all, you need to be clear about what exactly the hacker is doing to you, such as leaking your financial information. Trade secret? The qualitative nature of various behaviors is not the same.

    If so, you can report the case to the public security organs, but if not, you will not meet the requirements for filing a case. Reinstalling the computer system grid will solve the problem.

    Serious or not serious To see what rights are actually violated to you is not that you think it is serious or not serious. Why only through legal sanctions? It's a little bit clearer and it's not that complicated.

    How to deal with hackers violating personal privacy?

    Hello, I've seen your question here.

    First of all, you need to be clear about what exactly the hacker is doing to you, such as leaking your financial information. Trade secret? The qualitative nature of various behaviors is not the same.

    Personal privacy depends on whether the circumstances are serious, if so, you can go to the public security organs to report the case, if not, you will not meet the requirements for filing a case. Reinstalling the computer system grid bridge imitation rock tray can solve the problem. Serious or not serious To see what rights are actually violated to you is not that you think it is serious or not serious.

    Why is Minyu only sanctioned by law? It's a little bit clearer and it's not that complicated.

    You've got it all.

    Call the police directly from your side.

    There is also money, a series of personal privacy.

    You can call the police directly.

    But I deleted all his messages.

    I also formatted my phone.

    There is no evidence, how to deal with it.

    There's nothing left.,There's the other party's personal information.。

    Without. If you're on your side, there's no way around it.

    Please be prepared.

Related questions
26 answers2024-06-25

I always think that hackers are so powerful, but if you want to choose more powerful, you naturally have to choose your own country, hehe.

8 answers2024-06-25

Hackers generally refer to people and computer scientists who are good at IT technology. Hackers are proficient in a variety of programming languages and operating systems, and have grown with the development of computers and networks. The word "hacker" is transliterated from the English hacker, which has no obvious positive or derogatory connotation, and is judged according to the context in English applications, and its original meaning is similar to the words such as knife catcher, gunman, and expert that are often mentioned in Chinese dialogue. >>>More

8 answers2024-06-25

A hacker is someone who likes to use their intellect to push the limits of their mental power through creative methods, especially in their field of interest, such as computer programming or electrical engineering. >>>More

15 answers2024-06-25

Leaking privacy after losing a mobile phoneMobile phone has become the most personal tool for people. Once the mobile phone is lost, the text messages, emails, and even personal online banking accounts and passwords such as Alipay saved in the mobile phone may be leaked, and personal privacy and property security may be significantly threatened.

32 answers2024-06-25

Hacking into your mobile phone computer to view your privacy problem, in fact, the two parties can communicate well. And since he's a hacker, he's sure to be able to use his knowledge to surprise his girlfriend, such as making up a program that can record important dates like anniversaries and birthdays when you're both together, and when that day comes, the program can ......celebrate you in a way that only the two of you can understandJust like I saw a news before, a college student in the computer department hacked into all the computers in the department, and then used these computers to confess to the goddess. I find it more interesting to have a boyfriend like this.