首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Worried about Internet companies spying on your online browsing? You might turn to something called a virtual private network to
Worried about Internet companies spying on your online browsing? You might turn to something called a virtual private network to
admin
2018-03-26
64
问题
Worried about Internet companies spying on your online browsing? You might turn to something called a virtual private network to protect your privacy. But researchers say these networks can themselves be insecure.
Earlier this year, the federal government rolled back rules that would have prevented Internet service providers from tracking your activity online. Comcast, AT&T and other providers are now allowed to track and sell your personal data too—with much less fear of regulatory action.
One solution is a VPN, which is like a dark, secret tunnel you use to go from your computer to a website. While you’re inside the tunnel—clicking on Instagram photos or checking your bank account—third parties can’t see what you’re doing. There are lots of reasons people around the world use VPNs: to hide location, to access work networks, even to avoid government censorship (审查).
Internet providers handle customer privacy in different ways. Some say you have to opt in for them to sell your data. Because of Internet-connected devices, providers can see more than the websites you browse.
So, who cares whether Time Warner Cable or Verizon knows when I turn off my lights or whether I stock my fridge with Swiss or cheddar?
For one thing, those data points can be used to target advertising. And the government or private companies could use the information to deny services, like health insurance—or even water.
Some VPNs promise anonymous (匿名的) browsing for free or just a few dollars a month; they claim not to share your data. But these services don’t always deliver on their promises. Sometimes the medicine might be worse than the illness. In the first major review of VPN providers, what researchers found was alarming. Nearly 40 percent injected malware (恶意软件).
Experts suggest researching a VPN before using it and to think of it as a supplementary tool, not a privacy solution. They advise reading the VPN service provider’s privacy policy to see whether it collects or retains any user information that could be traced back to you.
What does the author think of VPN service providers?
选项
A、Most of them tempt the users with low price.
B、They themselves might be the privacy intruder.
C、Researchers warn them of the virus infection.
D、They tend to steal the users’ data for survival.
答案
B
解析
推理判断题。定位旬提到,在对虚拟专用网络供应商的第一次重大审查中,研究人员的发现令人震惊。下一句具体说明震惊的原因:近40%的供应商引人恶意软件。结合前一句提到的“有时治疗用药可能比疾病本身更糟糕”可以推断,虚拟专用网络供应商存在侵犯用户隐私的可能,故答案为B)。A)“多数供应商用低价引诱客户”,倒数第二段首句提到一些虚拟专用网络承诺免费匿名浏览或一个月只花几美元,并未说多数供应商都这样做,故排除;C)“研究人员警告供应商有感染病毒的危险”,文中只提到近40%的供应商引入恶意软件,感染的是用户,与供应商无关,故排除;D)“供应商往往为了生存盗窃用户数据”,文中并没有提到相关内容,故排除。
转载请注明原文地址:https://kaotiyun.com/show/0la7777K
0
大学英语四级
相关试题推荐
Ifyou’relikemostpeople,you’rewaytoosmartforadvertising.Youskiprightpastnewspaperads,neverclickonadsonlinea
Ifyou’relikemostpeople,you’rewaytoosmartforadvertising.Youskiprightpastnewspaperads,neverclickonadsonlinea
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
A、Theyrefusedtoapologizeforhavingfollowedherthroughthetown.B、Theyregrettedhavingwronglyaccusedherofstealing.C
A、AllitscustomerswouldgetextramoneyfromHSBC.B、Heapologizedinavideocliponbehalfofhimself.C、Heexplainedwhath
TakeNapsatWork.ApologizetoNoOneA)InthepasttwoweeksI’vetakenthreenapsatwork,atotalofanhourorsoofshut-
随机试题
A.温肺化饮B.引火归原C.理气和胃D.下气消痰E.杀虫止痒胡椒具有的功效是()
孙先生,37岁。诊断急性白血病1个月,血小板计数20×109/L,病程中突然出现剧烈头痛、喷射性呕吐,视物不清、意识模糊。不正确的对症护理措施是
在可摘局部义齿制作中,下面哪项是塑料填塞最适宜的时期A.湿砂期B.粥状期C.丝状期D.面团期E.橡皮期
与极滋养层接触的蜕膜称覆盖在囊胚上面的蜕膜为
(2009年)饮用水加氯消毒中,起主要作用的成分是()。
下列关于安全防护装置的选用原则和常见的补充保护措施的说法,错误的是()。
对于前期差错更正,企业应当在附注中披露的内容有()。
零和博弈指参与博弈的各方,在严格竞争下,一方的收益必然意味着另一方的损失,博弈各方的收益和损失相加总和永远为“零”,双方不存在合作的可能。下列不属于零和博弈的是()。
软件危机是软件产生过程中出现的一种现象,下述现象()是其主要表现。Ⅰ.软件需求增长难以满足Ⅱ.软件开发成本提高Ⅲ.开发进度难以控制Ⅳ.软件质量不易保证
基于ARM内核的嵌入式芯片中的中断控制器的功能是对芯片中相关硬件组件的中断请求进行管理和控制,一般采用【63】_______中断(VIC)或【64】_______中断(NVIC)方式管理中断。
最新回复
(
0
)