The black technology empire started with a debt of one billion

Chapter 264 Chapter 280: Security Mechanism of Deep Blue Mobile Phone

Chapter 264 Chapter 280: Security Mechanism of Deep Blue Mobile Phone
"Do Deep Blue's products really steal user information? Then has all my privacy been leaked?"

"Hey, I'm so scared now. Did my photos get leaked? They are all photos of me earning subsidies outside. My husband will definitely divorce me."

"Ahem, those upstairs want to earn subsidies, please contact me next time."

"+10086."

"What does this +10086 mean?"

"I didn't know that this was how Chinese people posted their comments."

"I have many uncles' phone numbers on my phone. If these numbers are leaked, these uncles will be robbed. How can I buy bags and shoes in the future?"

"Miss upstairs, although I am only 25 years old, I am very willing to support you."

"Let's see what NTT says first. NTT is the agent of Deep Blue Technology. I believe NTT will give us an explanation."

After reading the comments from netizens, Mukata Katsuki immediately called Matsuda Yuichi on his mobile phone.

"Yuichi-san, I hope you can give me an explanation regarding Deep Blue Technology's theft of data." Mukata Katsuki said seriously.

"Katsuki-san, I just learned about this matter. Deep Blue Technology has not stolen any user data. I will contact the headquarters now.

We will give NTT and the public an answer before get off work today. "Matsuda Yuichi said.

"Yuichi-san, your company should come up with a solution as soon as possible, otherwise our cooperation will have to be cancelled." Xiangtian Katsuki said.

"Yuichi-san, please rest assured that we will definitely give NTT and the public a satisfactory answer." Matsuda Yuichi said.

Office of the President of Deep Blue Technology.

After receiving a call from Matsuda Yuichi, Lu Bingwei asked the other party to wait patiently and the headquarters would give him a reply later.

Lu Bingwei hung up Matsuda Yuichi's phone and came to Cao Mang's office.

"Mr. Cao, Guoguo has published an announcement on the official website of Jiaopenji that Deep Blue Technology has stolen data. This matter has now spread on the Internet of Jiaopenji.

Now NTT wants us to give them an explanation, otherwise our cooperation with NTT will be cancelled. " Lu Bingwei said.

"Let Matsuda Yuichi hold a press conference to tell the public that we have not stolen user data, and we will sue the fruit company, and let him issue a reward to the public.

Anyone who can find evidence that Deep Blue has stolen user data, Deep Blue Technology will reward those who find the evidence with one billion dollars.

In addition, let him popularize the ID lock of the deep blue system to the public.

If users are afraid of the leakage of ID lock information, we can set up the ID lock server in Jiaopenji, and we can hand over this server to NTT for management.

In addition, popularize the security measures of the deep blue system to customers, and tell users that the deep blue mobile phone is the safest mobile phone in the world. " Cao Mang said.

The deep blue system does not create free icloud cloud space like fruit.

If you really want to say that Deep Blue can only detect whether Deep Blue has stolen data through data monitoring.

The problem is that DeepBlue did not steal user data.

How could they possibly find evidence that Deep Blue Technology had stolen data?

As for Deep Blue Technology’s ID lock.

Later generations of mobile phones have this function.

When a user logs in with his or her ID on a mobile phone, others cannot use the phone without the ID. It is impossible to unlock the phone by flashing the phone.

The only way is to find official after-sales service to unlock it.

"I see." Lu Bingwei nodded.

Foot Pot Chicken 04:30pm.

Tokyo Grand Hotel.

I have to say that NTT’s energy is really great.

Matsuda Yuichi held an emergency press conference with the help of Mukata Katsuki.

There were more than 30 reporters present at the press conference.

After confirming that all reporters were present, Matsuda Yuichi walked from the stage to the stage.

Fortunately, the reporters at Jiaobenji are very polite and orderly.

These reporters will not ask questions without the owner's permission. If this press conference is held in the lighthouse country, I believe those reporters will ask malicious questions to Matsuda Yuichi before he speaks.

Matsuda Yuichi first bowed to the reporters present to express his thanks.

"Hi everyone, I am Yuichi Matsuda, the president of Deep Blue Technology Foot Pot Chicken Branch.

I believe everyone already knows that at [-] o'clock this afternoon, the official website of Fruit Foot Pot Chicken released an announcement saying that Deep Blue Technology had stolen user data.

Deep Blue Technology deeply condemns this false announcement and the use of such unfair competition methods by Fruit.

For this reason, Deep Blue Technology will apply to the Tokyo Court for litigation.

For the reputation and innocence of Deep Blue Technology.

Deep Blue Technology will issue a reward of one billion US dollars to all walks of life. "

The reporters present were in an uproar when they heard the billion dollars. No matter how polite they were, they were shocked by this figure.

After the reporters quieted down, Matsuda Yuichi continued: "Anyone who finds evidence that Deep Blue Technology has stolen user data, Deep Blue Technology will reward the discoverer with a billion dollars.

In addition, Deep Blue Technology also wants to tell the public one thing.

DeepBlue Technology’s mobile phones are the most security-focused mobile phones in the world.

Next, I will explain the security mechanism of Deep Blue Technology to you.

Please look to the big screen. "

At this time, a PPT screen appeared on the big screen behind him.

“I believe many users who have used DeepBlue phones know that when installing APP on DeepBlue phones, the system will frequently pop up a dialog box, which will ask the user whether to provide permissions.

Many users are very annoyed by this feature.

But everyone doesn’t know that this function is for everyone’s data security.

Some APPs require system permissions after installation, but some APPs will obtain permissions they cannot use. As for why they need to obtain these permissions
We don't know this.

But after they obtain these permissions, they can obtain user data through these permissions.

In order to prevent this situation, Deep Blue Technology will ask the user when the user installs the APP, and the user can identify whether the APP uses these permissions.

Even fruits cannot do this function.

This is why I say that Deep Blue Technology is one of the safest mobile phones in the world.

In the future, Deep Blue Technology will build its own software store within three months.

Deep Blue Technology will identify and review applications for customers in advance, so as to avoid the possibility of users being stolen by third-party programs.

Of course, in addition to this security function, the deep blue phone has another function.

This function is also designed to ensure user data security.

This function is our ID lock function.

I believe that users who buy DeepBlue mobile phones know that the warranty of DeepBlue mobile phones is calculated from the activation date. To activate the mobile phone, you must register a DeepBlue Technology ID.

After registering the ID of Deep Blue Technology."

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like