How to protect user privacy information? See how big companies handle it!

How to protect user privacy information? See how big companies handle it!

Let’s summarize the practices and design points of major products in terms of “privacy protection”, so that there will be more entry points and reference objects when designing for user privacy information in the future.

We use a variety of apps every day, including financial, social, and e-commerce apps, and these apps store your important private information, such as login passwords, amount values, identity information, and so on.

We working people are sensitive to this private information, but we have no choice but to trust these apps.

Therefore, today we will summarize the practices and design points of major products in terms of "privacy protection", so that we will have more entry points and reference objects when designing for user privacy information in the future.

Password input protection

Passwords are the keys to log into various apps, and they are also the basis for protecting our information data. In terms of protection in this regard, various apps have come up with various tricks, both in terms of design techniques and system functions.

1. After iOS screen recording and screenshot: hide password

Thanks to iOS's consistent emphasis on user privacy, when filling in passwords on various APPs is monitored by screen recording and screenshot functions, Apple can also use its own technology to detect and keep it confidential.

The saved images and videos will automatically hide any traces of password entry, including encryption symbols and characters entered on the keyboard.

2. Bilibili: Creating an “anti-peeping” perception

When you enter your mobile phone number in the Bilibili app, the mascot above always keeps its eyes open, but when the cursor is positioned on the "password" or "verification code" input field, the mascot changes to "covering its eyes".

This use of surrounding elements to create the perception that "no one will see your password" is also a common practice among many APPs.

3. Bank APP: Custom keyboard

This is only available in specific types of products, such as banking, finance, and financial management apps.

In order to protect the security of user information, these products will customize and develop a set of mobile phone keyboards to ensure that the characters entered by the user are displayed randomly and irregularly each time.

Avoid others from remembering your click area and order, so as to obtain relevant information. But the corresponding implementation cost is not low~

Identity information shielding

1. Meituan: Automatically anonymous when giving negative reviews

For example, Meituan and Ele.me will automatically check the anonymous review option when users give low-score reviews to prevent users from being maliciously harassed by merchants.

However, this is only the apparent practice. I have always been xx about whether merchants are really unable to obtain user information.

2. Didi Hitch: Delayed release of negative reviews

In addition to automatic anonymous evaluations, Dida Carpool will delay the publication of negative reviews to protect users from malicious harassment from drivers through the time difference.

3. WeChat: Create a new pseudonym

When using WeChat to log in to other apps or websites, you can create an identity to log in. The new identity includes a new avatar and nickname, which can also be obtained randomly.

Avoid synchronizing your main social information with other platforms, especially when using Tencent products and in scenarios where you “don’t want to be known by WeChat friends.”

Protection of Amount Value

1. Wealth Management: Hidden Amount Text

When hiding the amount of money, Licaitong does not show only the encryption symbol (******) as in the traditional way, but changes the encryption characters into the text: "empty".

This concept of 'nothing' is more effective in terms of the perception of privacy protection than 'yes, but encrypted'.

2. Ping An One Wallet: Hide the amount when your hand covers the screen

The amount of your personal assets will not be displayed directly in the personal assets area. When you cover the screen with your hand, the system will predict that you only want to be visible secretly, and automatically display the amount of your assets. This privacy design that uses screen perception is also a highlight.

Screen Recording Processing

In addition to the above-mentioned hidden passwords of iOS, other apps also have corresponding design points.

1. Bank APP: Pop-up warning

For example, Bank of China or Industrial and Commercial Bank of China will force a pop-up window to remind users when they are asked to enter passwords through screen recording.

This is a relatively compromise approach, and serves as a security reminder. However, after the reminder, the user can still enter characters while recording the screen. Even if the password is encrypted, the characters entered on the keyboard are still recorded one by one.

2. Maimai: Black screen processing

Maimai directly turns the screen black to remind users to stop recording before they can enter the password normally, rather than asking users to enter the password in a dark environment.

I heard that IKEA previously hid not only the characters of the password but also the number of digits of the password when facing screen recording.

Screenshot processing

This is also the most common scenario in daily life, which can save all sensitive information on the screen as images. Therefore, for products with high security requirements, users' screenshots will be processed and warned.

1. Alipay and WeChat Wallet: Risk Warning

In Alipay and WeChat wallets, when taking a screenshot of the payment code, the user will be reminded of the risks of taking the screenshot.

2. Banking apps: screenshots prohibited

Some banking apps are stricter in this regard and directly prohibit users from taking screenshots.

3. QQ: Hide your name with one click

When taking QQ screenshots, you can block the user's QQ nickname with one click to avoid spreading your social information.

Multi-window leakage processing

When a phone opens multiple screen windows, the information leakage in the application is an easy-to-ignore place. Even if the content visibility in each application is not very strong, that small area still makes it easy for others to know what you are doing (especially when checking a certain aspect).

For this aspect of design, the processing of some large-scale APPs provides us with some directions and references, such as:

1. Alipay: Blurred interface content

Alipay and Ant Fortune blur the content on the screen when multiple windows are activated.

2. UC Browser: Black screen processing

UC Browser will directly display a black screen and won’t let you see anything.

3. Tide: Retaining Users

When the product has multiple windows, it prompts users not to close the app, which plays a certain role in product retention. Even when there is nothing in the product that can leak user privacy.

Conclusion

Well, the above are some of the major APPs’ protection scenarios and countermeasures for user privacy. I hope you can flexibly apply these techniques according to your actual situation.

<<:  How can a UI designer who has been working for one or two years and is still standing still advance in his studies?

>>:  In 2021, many websites will stop working on older versions of Android

Recommend

Why do maternal and infant brands need to conduct private domain operations?

When all industries are digging for gold in the p...

Xiaohongshu is back on the shelves, how to carry out promotion?

After 77 days since the Xiaohongshu APP was taken...

Sogou promotion case in the medical beauty industry

Everyone loves beauty, and more and more people a...

A world first! How come mushrooms grow on this frog?

Last summer, in the mountains of western India, r...

iOS 15 is reported to have bugs and no highlights

[[425492]] This Tuesday, Apple pushed the first o...

Tips for Weibo promotion and traffic generation

Weibo can be said to be a big brother-level platf...