Article | & have spent Xu's
Convicted of fraud through coupon loopholes; Use the platform loophole wool, sentenced; Drilling platform loophole wool, arrested... Recently, several headlines about "wool pulled up to be punished" have brought the "professional wool party" into the public eye. Therefore, many people realize that malicious wool pulling may be illegal, causing widespread discussion.
Set up the second kill discount, large reduction, coupons and so on are common profit activities, within the rules, consumers enjoy preferential treatment, business promotion marketing, platform access to traffic, this is a happy thing. But some people do not for the purpose of consumption, or the use of platform rules, technical loopholes, or the use of plug-in software, fake accounts, business promotion into their own way of profit, to seize the benefits of the benefit to consumers, but also cause losses to businesses. Such acts of malicious wool pulling violate the principle of good faith stipulated in the Civil Code and constitute unjust enrichment. If the circumstances are serious or the amount is huge, they are suspected of illegal crimes.
In the eyes of lawbreakers, the "sheep" being pulled up are not only businesses and platforms, but also consumers who want to pull up the wool. Not long ago, Yangzhou City Hanjiang District People's Procuratorate on a computer information system for the fact of the crime of the case to prosecute. The defendant in wool pulled software bundled Trojan program, once someone download, use, can steal account information and even computer files, for their own use. Users seem to get cheap software, in fact, exposed privacy, not only may suffer property losses, but also may become a link of the network black gray industry chain, security risk is great. This IS TO CONSUMER ALERT: BY FLY HEAD SMALL PROFIT FAN EYE, FALL INTO THE TRAP OF ILLEGAL ELEMENT LIKELY, RAISE ONESELF SAFETY CONSCIOUSNESS ONLY, JUDGE CALMLY BEFORE IMPROPER INTEREST, ABILITY RESISTS TEMPTATION, GUARD AGAINST RISK.
In fact, wool pulling is illegal or not to trigger the discussion, an important reason is that this kind of behavior involves often ignored network security, information security issues. In real life, people closely related to the network security, information security problems, not only hidden in wool such things, but also fingerprints, face and other biological password, scan code payment loopholes, telecom fraud, network fraud, water army brush single, water arms control evaluation, network virus transmission, and so on. The more deeply people's lives are integrated into the Internet, the more likely they are to encounter non-traditional security problems, which can cause significant losses if they are not aware of them. To warn, to reason, is to remind people of network security is no small matter, so that more people often ask themselves "you are safe". Only the network security for the people, network security on the people's consciousness, into the people's conscious action to protect security, can better build a secure dam.
Security is the prerequisite for development, and development is the guarantee of security. In recent years, from the enactment of the cybersecurity law, to the introduction of the "cybersecurity review Measures"; From strengthening the information infrastructure network security protection, to the construction of network security information coordination mechanism, means, platform; From the purification of Internet content, to strengthen the comprehensive management of the network; From developing the cyber security industry to carrying out a series of net net actions... Pragmatic measures to safeguard cyber security have further closed security loopholes at the legal and institutional levels. To address the concerns and interests of the people, it is still necessary to take multi-faceted and multidimensional measures to safeguard cyber security, constantly improve the ability and strength to safeguard cyber security and information security, and promote development through security and development in the pursuit of shared governance.
"Not every rule loophole can be exploited! This is an admonition to malicious wool pulls, and a reminder to navigate cyberspace without losing your measure. The legal red line can not be crossed, the bottom line of safety can not be touched, only everyone's responsibility, everyone's participation, in order to protect everyone, everyone enjoys security with us.