代写 TAG标签
网站地图
英国作业美国作业 加拿大作业
返回首页

微信技术实践的伦理困境The ethical dilemma of technological practice on

时间:2019-07-15 10:42来源:未知 作者:anne 点击:
微信能够在智能手机应用中取得成功,不能离开其技术架构的独特性,微信软件的敏捷性和准确的产品定位是其成功的关键因素。腾讯在开发初期就将微信定位为即时通讯软件。同时,它显示了与其他软件的区别。敏捷性是指微信团队在使用过程中出现问题或漏洞,违反相关规定,能够及时进行修改和升级的能力。因此,本文希望探讨微信技术实践的伦理困境。
WeChat can succeed in among smart phone applications, cannot leave the uniqueness of its technical architecture, WeChat software agility and accurate product positioning is the key factor for its success. Tencent positioned WeChat as an instant messaging software early in its development. At the same time, it shows the difference with other software. Agility refers to the ability of the WeChat team to modify and upgrade in a timely manner if there is a problem or vulnerability that violates the relevant regulations during the use. Therefore, this article would like to discuss the ethical dilemma of technological practice on WeChat.
在网络中共享和运行需要协议。操作系统和运营商之间的协议是相同的。如果你需要在微信中扩展新功能,你需要添加新的逻辑和协议。如果协议内容在其他移动软件中过大,将导致冲突(Lien&Cao,2014)。但在微信中,该协议满足正向兼容的条件,新增加的协议可以作为对以前协议的补充和扩展。在协议代码的生成过程中,不需要进行比较,只需进行描述,然后使用代码生成工具。添加新逻辑通常会导致数据量增加。程序的大小变化不大,新的数据将存储在原来的冗余空间中。这是因为原始数据存储空间的末尾有一个标志字段,用于标识剩余空间的大小。
Sharing and running in a network requires protocols. Protocols are the same across operating systems and carriers. If you need to extend new functionality in WeChat, you need to add new logic and protocols. If the content of the agreement is too large in other mobile software, it will cause conflicts (Lien & Cao, 2014). However, in WeChat, the protocol satisfies the condition of forward compatibility, and the newly added protocol can be regarded as supplementing and extending the previous protocol. During the generation of protocol code, there is no need for comparison, just use for description and then code generation tools. The addition of new logic often leads to an increase in data volume. The size of the program does not change much, and the new data will be stored in the original redundant space. This is because there is a flag field at the end of the original data storage space to identify the size of the remaining space.
在微信新发布的过程中,并非所有的逻辑变化都是一次性发布的。在每次更新中,只分发一部分内部测试用户,在确认没有问题后,将释放所有用户(Dong等人,al,2018)。灰度发布不会走极端,所以用户有更好的响应。将所有用户移动到系统B,并使用传统的ABTEST模式进行平滑过渡。在这个过程中,一些用户使用系统A,另一些用户使用系统B,通过实际应用测试,可以及时修改问题。
对于微信中更复杂的逻辑,它被固定在后台。在这一过程中,需要处理的问题主要包括存储组件的扩展和屏蔽灾难、监控报告、统计和监控框架,随时添加新的逻辑、逻辑服务器容器的逻辑、10分钟的内部S结构。服务器和客户端自动代码生成框架等。During the new release of WeChat, not all logical changes are released at once. In each update, only a part of the internal test users will be distributed, and after confirming that there is no problem, all users will be released (Dong et.,al, 2018) . The grayscale release will not go to extremes, so users have a better response. Move all users to system B and make a smooth transition using the traditional ABtest mode. In this process, some users use system A, others use system B. Through the actual application test, the problem can be modified in time.
For more complex logic in WeChat, it is immobilized in the background. In this process, the need to deal with the problems mainly include the storage components of expansion and shielding disaster,  monitoring reports, statistics and monitoring framework, at any time to add a new logic, logic of LogicServer containers, ten minutes of the construction of the internal Server and Client framework of automatic code generation, etc.
In the technical architecture of WeChat, clearer module design is adopted. In the whole large system, various functions of storage and logical structure are designed separately. In this way, in the process of WeChat operation, once a problem occurs, it can be timely discovered (Dai et.,al, 2015). WeChat, logic with similar functions will be placed in a unified storage space, and logic with different functions will be placed in different storage Spaces. In this way, there will be no contradiction and conflict between different logic, and when modifying one logic, it will not affect the normal operation of other logic. Among numerous logic, if need to modify and expand a certain logic, just need to find the corresponding logical block, and carries on the part of the change, don't need to modify them one by one the whole logic, greatly improve the efficiency. Finally, all the logical functions are provided to the user through the same interface to realize user-oriented operations.
By setting WeChat's name and avatar to an official account, you can impersonate WeChat's assistant and defraud WeChat users' information. WeChat has positioning function. By three-point positioning method, the location of the target can be determined, so as to obtain the location information of WeChat users. Shake function in WeChat can match users who use this function together at the same time, and provide information of both parties, which is easy to be used by criminals. In WeChat's friend circle function, strangers can view 10 photos of users without corresponding Settings. In this way, some criminals can obtain certain information from photos, so as to conduct targeted fraud (Lisha, et.,al, 2017). Therefore, WeChat users should turn this function off to prevent inadvertent disclosure of their private information. In addition, if WeChat users do not set up friend authentication, some people will send some interesting content or links to users after adding them as friends and include Trojan horses, viruses and so on. Once the user enters the content, the Trojan virus will invade the user's mobile phone and steal the information. Added in the new WeChat WeChat payment functions, there are a lot of potential safety problems, the lack of a digital certificate, the function such as identity authentication, only through bank card password to protect the security of funds, very easy to crack outlaws, resulting in economic losses.
For the traffic generated by the application software, it is saved through the Android simulator, installed and logged in WeChat, and then sent messages. WeChat runs most of the traffic generated on TCP port 8080, reserved for HTTP connections. However, Wireshark cannot parse an HTTP load. WeChat's communication protocol is custom, and the initial load is to recognize the initial header, where there is no HTTP session. The subsequent body of the message is associated with the opcode in the form of encryption. In version 4.3.5 of WeChat, there are some loopholes that can intercept the message body for fast decryption of traffic and send and receive user mail attacks(Yang, Chulu, & Danqing, 2018). Developers use unlicensed debugging infrastructure to debug WeChat, but attackers can also use it to steal users' private information. In addition, there are also significant vulnerabilities for remote logging. With this capability, an attacker can develop a malicious program to leak the ContentProvider. The appropriate debugging is then set up to obtain WeChat log records and control the server.
In the real world, people's communication activities are restricted by laws, morals, customs and other social norms, and the virtual and indirect nature of WeChat provides a virtual communication space for people. In order to avoid all kinds of constraints, some people prefer to use WeChat for communication and seek for knowledge. In the world of WeChat, communication object is not so much a real person, but rather a artificial intelligence, a strong communicative subjects have a reality, exchanges between the object and their interactions with the virtual sex. In such an environment, people get rid of the restriction of social norms and the influence of material factors in their communication and become more freewheeling. When people immersed in the fantasy, the reality of interpersonal communication ability will decline, leading to not adapt to the realistic social interactions, or virtual in a way for the reality of interpersonal communication, obviously the two interactions cannot agree, prone to frustration for communicative subjects, exclusion of reality. Severe frustration may cause people to abandon their real relationships and experience feelings of emptiness, anxiety, loneliness and insecurity. When an individual cannot get self-recognition in the real communication, he will seek for himself in the virtual communication, and then form two selves, namely the ego in the virtual world and the ego in the real world. These two selves are mutually exclusive and contradictory, and the confrontation between reality and fiction can easily lead to the split of personality. In addition, if people sink too much in the virtual world, they will ignore the real world. Human nature is a living creature in reality, the personality un-unity between the two worlds, and the neglect of the real world. As the subject of practice, people will have doubts about their real existence.


推荐内容
  • 英国作业
  • 美国作业
  • 加拿大作业
  • 英国essay
  • 澳洲essay
  • 美国essay
  • 加拿大essay
  • MBA Essay
  • Essay格式范文
  • 澳洲代写assignment
  • 代写英国assignment
  • Assignment格式
  • 如何写assignment
  • case study
  • literature review
  • Research Proposal
  • Summary范文
  • Reference格式
  • presentation
  • report格式
  • PEST分析法
  • Admission Essay
  • Personal Statement
  • Motivation Letter
  • Application Letter
  • recommendation letter