A
(2021·山东淄博一模)
Several years ago, when someone used camera covers to protect against possible monitoring, it was not popular to talk about it. Today, people use various types of tapes to cover the web cameras and microphones.
There are many types of spyware that can dive into our devices and secretly spy on them, recording everything they do. Such programmes may infect not only computers but also smartphones. Your data may be used by hackers who will try to request money for not exposing your private information or by companies like NSO Group who created a kind of spyware to “provide authorised governments with technology that helps struggle against terror and crime”.
In my opinion, the protection technique is highly overestimated. Users tape the cameras and microphones through lack of understanding of how their devices work and how the malware(恶意软件) works. Hackers and even secret services do not have enough resources to monitor all victims using the cameras or microphones. If they need to get any information, they get it by sending a targeted virus to your device, which will not be stopped by the tapes. Such a virus will find what to steal—from personal photos and videos to passwords from social networks, browser history, bank accounts and so on.
It is unwise to believe that attackers will not be able to find a way to spy on you, even if the device, discharged to zero, can still deliver data about your location, using the smartphones of the surrounding people as signal repeaters. Let us face it: we live in an era when it is extremely difficult to hide something and a piece of tape is clearly not the most useful tool in the struggle for your privacy.
Again, to be able to spy on you, attackers need to plant the malware in your device. To prevent the malware from entering your device, do not click suspected links and email attachments. Use strong passwords for email, social media and online bank accounts.
1.Whatdoestheunderlinedword“them”inparagraph2referto?
A.Cameras. B.Types.
C.Programmes. D.Devices.
2.What is NSO Group?
A.A group of hackers.
B.A company developing spyware.
C.A group of terrorists and criminals.
D.A company fighting against crime.
3.Why does the author think “the protection technique is highly overestimated”?
A.People know little about their devices.
B.Hackers have no access to others.
C.It hardly prevents the malware from getting privacy.
D.It can’t cover the cameras completely.