十三歲去開盒,誰的鍋?

网曝百度副总裁谢广军13岁的女儿身为张元英的粉丝,在微博开盒素人孕妇。据悉,这名孕妇被开盒是由于韩国女星张元英评论引发。此外,她还曝光自己的父亲是百度副总裁任职期间月薪22万。
3月17日报道,百度副总裁谢广军道歉:深感愧疚,郑重道歉。


這個真不是百度鍋。
政府強推實名制後,從學習通志願匯,到所有電商,到公安數據庫,到黨員數據庫⋯⋯一眼一眼看著,最多一年時間,國人信息在幾乎是個人就可以查的社工庫,已經跟政府公安部門普通查詢差不多一樣齊全了。
這就是為什麼13歲的孩子都可以去開人家盒的根本原因;社工庫本身也內卷,更使得這件事幾乎已經到零成本;不想費心思精力的,稍微付點費,開房記錄,12306購票等⋯⋯都是齊全的。

這個坑,在政府去掉實名制之前,無解。

為什麼要說?
目的是提醒各位:

  1. 最大可能遠離社交媒體,考慮國內社交媒體的實名落實程度,戒了最好。
  2. 不要跨平台使用相同用戶名,以免被關聯。
  3. 不要或至少少發個人照片和視頻,太容易被換臉被⋯⋯
  4. 最大限度不要使用任何真實個人信息,在所有平台。
  5. 除非明確同意,絕對絕對不要拍身邊人;有所不為。
  6. 開人這事,早已不是能不能的能力問題,而已經是該不該的道德,都自重。這孩子現在被反噬,還不夠看嗎⋯⋯
  7. 你恨ta,就要開ta嗎?那這世界上誰不被誰恨呢?
  8. 自己想吧

Last edited by @suen 2025-03-19T10:22:02Z

4 Likes

飯圈魅力時刻了

2 Likes

國内開盒是真危險,畢竟,中國人不騙中國入

1 Like

传说中的年少有为?

2 Likes

只是沒底線。現在開盒簡簡單單,付一點錢很容易就能開盒。

突然觉得自己在各大平台特别喜欢用默认用户名是个极好的事情()

2 Likes

補一句;❤️‍🔥要多科學,有多研學
只在此牆中,很多人可能都忘記了,VPN和VPS這種技術,發明出來可從來不是為了翻牆⋯⋯而更多是為了控制權限和保護隱私
這才是為什麼全球有很多這類公司的原因,只是,我們用來翻牆了。

所以,其實自己買機器,保持通過代理上網的好習慣,也是必修。
畢竟,系統底層,各類APP濫權,其實才是更可怕的隱私洩露。譬如你手機相冊,手機定位,你不刻意設置,太多App會直接明著暗著,拿走你手機內幾乎全部數據⋯⋯

2 Likes

買一年vps也就80到120(比較便宜的),也就相當於一個網站的會員。建議大家都買一個。

1 Like

—— 正在向所有人高奏您的MVP凯歌Blitz Kinds-有为青年(StatTrak™)

1 Like


客服告诉记者,查询一年的开房记录收费800元,每加一年增加200元,并附带同住人信息;查询聊天记录一年1000元,每加一年追加300元费用……如果全部“开盒”可以优惠几百元,仅查户籍信息则收费300元,支付宝微信都可支付。

记者经同事授权后,花费300元便买到了其户籍信息,有客服宣称“其中240元是公安网站户籍截图的费用”。

1 Like

這麽貴?我記得沒那麽貴吧。

含智商稅

1 Like

出了这种社会影响较广的事,是否会导致开盒乃至翻墙被更严的监管?

1 Like

這個事影響力還沒到。等哪天有重要人物子女被開了估計才會管開盒。還有開盒和翻牆關係沒那麽大,牆內也有非電報的社工庫。

开开你 :face_savoring_food:

1 Like

補藥啊!

你語文誰教的⋯⋯帖子上哪個字你老師沒教過:(

3 Likes

香蕉派也被开过,子女什么的估计早出来了。

1 Like

影響力不過,得是大庭廣眾的開估計才會管。

US teachers’ union says hackers stole sensitive personal data on over 500,000 members

Carly Page

8:42 AM PDT · March 19, 2025

The Pennsylvania State Education Association (PSEA), a labor union representing educators across the state, says hackers stole the sensitive personal information of more than half a million of its members.

PSEA is the largest organization for educators in Pennsylvania, representing current and former teachers, counselors, healthcare workers, and school social workers.

In a filing with Maine’s attorney general on Tuesday, PSEA said it experienced a cyberattack in July 2024 that saw an unauthorized actor access its network to steal a trove of data belonging to more than 517,000 individuals.

The stolen data includes highly sensitive personal information, such as members’ government-issued identification documents, Social Security numbers, passport numbers, medical information, and financial information containing card numbers, and their associated PINs and expiration dates.

PSEA said member account numbers, PINs, passwords, and security codes were also accessed during the breach, according to a letter sent to affected individuals.

“We want to stress that not all data elements were acquired for every impacted individual,” PSEA told affected members in the letter.

PSEA also said it “took steps, to the best of our ability and knowledge, to ensure that the data taken by the unauthorized actor was deleted,” implying that PSEA was the target of a ransomware or data extortion attack, and subsequently paid a ransom demand to the hackers responsible.

Paying a ransom demand is no guarantee that the malicious hackers deleted the stolen data. Last year’s takedown of the notorious LockBit ransomware gang unearthed evidence that the gang’s hackers still retained reams of data belonging to victims who had paid a ransom demand.

PSEA did not respond to TechCrunch’s questions.

大家一起猜, 這個庫需要多久被⋯⋯ https://jiaoshi.zjedu.gov.cn/

1 Like