Tagged articles
23 articles
Page 1 of 1
Su San Talks Tech
Su San Talks Tech
Jan 19, 2025 · Information Security

How Data Masking Protects Sensitive Information: Techniques and Best Practices

This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques and Best Practices
Java Tech Enthusiast
Java Tech Enthusiast
Nov 9, 2024 · Information Security

How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy

Companies can monitor employee WeChat chats on corporate‑issued, rooted computers through network sniffing, OS‑level screen capture, and file‑watching tools, allowing them to view personal messages, infer app usage, and thus personal privacy on work devices is vulnerable, so users should avoid personal WeChat on such devices or use separate accounts and enterprise archiving features.

Mobile Securityemployee monitoringinformation security
0 likes · 5 min read
How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 15, 2024 · Mobile Development

Common Pitfalls and Solutions When Developing WeChat Mini Programs with UniApp (Vue 3 + TypeScript)

This guide summarizes the typical problems encountered while building a WeChat mini‑program with uniapp + Vue 3 + TypeScript—such as nickname input validation, custom navigation bars, custom tabbars, iOS safe‑area handling, list scrolling quirks, and privacy‑policy configuration—and provides concrete code‑level solutions and best‑practice recommendations.

Custom TabBarUniappWeChat Mini Program
0 likes · 16 min read
Common Pitfalls and Solutions When Developing WeChat Mini Programs with UniApp (Vue 3 + TypeScript)
Data Thinking Notes
Data Thinking Notes
May 28, 2024 · Information Security

What Can Government Data Security Standards Teach Other Industries?

The article outlines a comprehensive government data processing security framework—including management, technical, personal information protection, operational, regulatory, and assessment requirements—that offers reusable, practical guidance for data security across various sectors.

data securitygovernment standardsprivacy protection
0 likes · 4 min read
What Can Government Data Security Standards Teach Other Industries?
Data Thinking Notes
Data Thinking Notes
May 16, 2024 · Information Security

How a Data Security Governance Platform Secures the Full Data Lifecycle

This article explains how a data security governance platform protects data across its entire lifecycle—from warehouse construction and collection to application—by implementing fine‑grained permission controls, encryption, masking, authentication, and comprehensive auditing, while addressing scalability, high availability, and regulatory compliance challenges.

AuthenticationAuthorizationBig Data
0 likes · 13 min read
How a Data Security Governance Platform Secures the Full Data Lifecycle
DataFunTalk
DataFunTalk
Apr 18, 2024 · Information Security

Kuaishou Big Data Security Platform: Architecture, Governance, and Practices

This article details Kuaishou's large‑scale data security platform, covering its background, architectural layers, authentication and permission models, full‑link audit, data classification and protection mechanisms, operational results, future road‑maps, and a Q&A session on practical challenges.

Kuaishouauditbig data security
0 likes · 14 min read
Kuaishou Big Data Security Platform: Architecture, Governance, and Practices
Su San Talks Tech
Su San Talks Tech
Apr 5, 2024 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains why personal data leaks happen, defines data masking (desensitization), compares static and dynamic masking, and details six common masking techniques—invalidating, randomization, replacement, symmetric encryption, averaging, and offsetting—to help developers safeguard privacy.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 2, 2024 · Information Security

iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT

iQIYI's proactive compliance risk disposal platform and full‑lifecycle privacy protection scheme were recognized by MIIT as outstanding cases, showcasing engineering‑driven privacy integration across product development, release, and operation, improving compliance rates, reducing risks, and enhancing user experience while setting industry standards.

compliancedata securityiQIYI
0 likes · 8 min read
iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT
Architects' Tech Alliance
Architects' Tech Alliance
Jan 22, 2024 · Fundamentals

Top 10 Technology Trends and Challenges for 2024

The article outlines ten major digital technology trends for 2024—including quantum computing, 6G communications, artificial intelligence, cloud‑native architectures, digital twins, privacy protection, Web 4.0, satellite communications, computing networks, and IoT—describing their principles, current status, and prospective applications.

6GCloud NativeDigital Twin
0 likes · 16 min read
Top 10 Technology Trends and Challenges for 2024
php Courses
php Courses
Jul 12, 2023 · Mobile Development

Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature

This article explains how to adapt mobile apps to the latest Ministry of Industry and Information Technology network entry rules by covering basic mode design, personal data protection, permission request practices, update notifications, and signature authenticity, while also listing example implementations from popular apps.

App UpdateRegulatory Compliancemobile app
0 likes · 6 min read
Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature
DataFunSummit
DataFunSummit
Dec 15, 2022 · Information Security

Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice

This article examines the growing complexity of financial risk scenarios, outlines global privacy regulations, describes Ant Group's three‑layer multi‑party secure risk‑control architecture, showcases anti‑fraud and external client use cases, and discusses current challenges and future directions for secure, privacy‑preserving risk management.

Regulatory Compliancefinancial securityprivacy protection
0 likes · 14 min read
Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice
AntTech
AntTech
Sep 28, 2022 · Artificial Intelligence

Advancing Trustworthy AI to Industrial-Scale Applications: Insights from Ant Group

The article outlines Ant Group's comprehensive approach to promoting trustworthy AI in large‑scale industrial settings, detailing the four core pillars of robustness, explainability, privacy protection, and fairness, and describing practical methodologies, open platforms, and ecosystem collaborations that drive responsible AI deployment.

FairnessIndustrial AIRobustness
0 likes · 13 min read
Advancing Trustworthy AI to Industrial-Scale Applications: Insights from Ant Group
vivo Internet Technology
vivo Internet Technology
Sep 21, 2022 · Information Security

Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches

The 2022 Vivo Qianjing Cup Cybersecurity Challenge, launched on September 15 under the “Assemble! Geek Youth” theme, invites nationwide security enthusiasts to uncover vulnerabilities in Vivo products through online puzzles and an offline final, offering a 200,000‑yuan prize pool plus uncapped bounty rewards and judging by experts from AWS, Ant Group and leading universities.

cybersecurityinformation securityprivacy protection
0 likes · 5 min read
Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches
DataFunSummit
DataFunSummit
May 24, 2022 · Information Security

Data Masking Techniques and Their Applications in Enterprise Data Security

This article explains the importance of data security under emerging privacy laws and provides a comprehensive overview of data masking concepts, common technical methods, typical enterprise scenarios—including static, database, and application-level masking—and strategic considerations for balancing business needs with privacy protection.

anonymizationdata maskinginformation security
0 likes · 12 min read
Data Masking Techniques and Their Applications in Enterprise Data Security
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Dynamic Maskingdata maskingdata security
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
Youzan Coder
Youzan Coder
Mar 14, 2022 · Information Security

Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice

To meet new Chinese privacy regulations, the article presents an mPaaS‑based solution that uses compile‑time Java HOOKs to replace privacy‑sensitive API calls and dangerous permission requests, automatically detecting and logging violations during build and runtime, and providing backend alerts and management tools for compliance.

ASMAndroidBytecode Manipulation
0 likes · 14 min read
Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice
Alimama Tech
Alimama Tech
Sep 15, 2021 · Artificial Intelligence

Alibaba Mama Open‑sources Curvature Learning Framework and Federated Learning Solution

Alibaba Mama announced the open‑source release of its Curvature Space Learning Framework and a Federated Learning Solution, promising up to 80% storage savings, 15% matching‑precision gains, enhanced privacy through federated computation, and broader applicability across search advertising, logistics, finance and healthcare.

AICurvature Learninggraph neural networks
0 likes · 8 min read
Alibaba Mama Open‑sources Curvature Learning Framework and Federated Learning Solution
Meiyou UED
Meiyou UED
Aug 25, 2021 · Mobile Development

How 3D, AR, Gyroscope, and Privacy Tech Are Redefining Mobile Experiences

From immersive 3D product displays and AR-driven interactions to gyroscope-enabled navigation, privacy safeguards, and seamless multi‑screen collaboration, emerging hardware and software innovations are expanding the capabilities of mobile devices, promising richer user experiences and new application possibilities across various industries.

3D applicationsMobile Technologyaugmented reality
0 likes · 10 min read
How 3D, AR, Gyroscope, and Privacy Tech Are Redefining Mobile Experiences
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

Dynamic Maskingdata anonymizationdata masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices
Meituan Technology Team
Meituan Technology Team
May 17, 2018 · Information Security

Data Security Practices and Solutions at Meituan: Application Systems and Data Warehouse

Meituan‑Dianping’s Information Security Center combats data leakage by deploying multi‑layered safeguards—device fingerprinting, CAPTCHAs, behavior‑based crawler detection, robust watermarking, honey‑pot datasets, UEBA analytics, and advanced masking, tokenization, privacy‑preserving techniques, asset mapping, and automated database scanning—to protect both application systems and its massive data‑warehouse environment.

Application SecurityUEBAdata masking
0 likes · 18 min read
Data Security Practices and Solutions at Meituan: Application Systems and Data Warehouse