search
HomeTechnology peripheralsIt IndustryShanghai Consumer Protection Commission: Manufacturers cannot use permissions to impose unreasonable restrictions on software from other channels, and consumers have the right to know

According to news from this website on August 22, the Shanghai Consumer Protection Commission issued a document today calling on mobile phone manufacturers to block third-party application downloads. Fair competition needs to be maintained and consumer rights need to be protected.

Shanghai Consumer Protection Commission: Manufacturers cannot use permissions to impose unreasonable restrictions on software from other channels, and consumers have the right to know

Currently, the Android system accounts for the highest proportion of smartphones in my country. There are two main sources for downloading application software for this system: one is the mobile phone brand’s own app store, and the other is third-party app stores such as Wandoujia and 360 Mobile Assistant, Tencent App Store, Baidu Mobile Assistant, etc.

Shanghai Consumer Protection Commission: Manufacturers cannot use permissions to impose unreasonable restrictions on software from other channels, and consumers have the right to know


Pixabay Many consumers have encountered this when they use third-party app stores to download and install apps on a daily basis: frequent pop-ups of installation permission windows or risk prompts, long-term risk detection, and redirects to recommended similar apps, and Scenarios that require user authorization or password verification in safe mode.
This site attaches the following views of the Shanghai Consumer Rights Protection Foundation:
Mobile phone root permissions should not be used as a technical means of competition. From the perspective of the technology itself, system root permissions can perform operations such as reading, writing, and modifying mobile phone system files or settings. Also known as super user authority, it is an important factor affecting the safe and stable operation of the mobile phone system.
Therefore, there is no problem in that root permissions cannot be freely opened to third parties. However, at the same time, manufacturers as system providers cannot use their "root permissions" to impose unreasonable restrictions on software from other channels, thus " weaponized” as a means of competition.
If this permission is used as a means of competition, it will not only hinder the fairness of competition and technological development in the application software market, but will ultimately hinder consumers' diversified choices and affect the consumer experience.
Competitive behavior shall not harm the legitimate rights and interests of other operators. From the perspective of market competition, downloading and using application software is essentially a form of service consumption. Mobile phone manufacturers and third-party application providers are both service providers. Their status in the market should be equal, and their rights and obligations in providing services to consumers should also be the same.
In other words, for the sake of consumer information security, the act of giving security tips to reduce risks is reasonable in itself, but the tips themselves should not appear repeatedly or cannot be bypassed, so as to avoid such competitive behavior from actually becoming a mobile phone Manufacturers use their own technological advantages to set up obstacles for other operators to provide services, harming the legitimate rights and interests of other operators.
This kind of reminder has played a certain role in intercepting or hindering other competitors from providing services, just like a restaurant owner installing a gate at the entrance of other people's restaurants. It is obviously contrary to the market economic order and the principle of fair competition.
Consumers’ right to know and choose should be fully exercised. From the perspective of consumer rights protection, the criteria for judging safety prompt information for downloading mobile application software are usually not clearly stated. Consumers have no way of knowing whether such prompt information is given based on technical security testing, or whether it is a unified prompt for non-branded app store software simply by identifying the download source.
Therefore, consumers cannot objectively judge the true security of third-party application software, and may eventually have to give up third-party channels. In fact, consumers have the right to know the true situation of the goods or services they purchase. This is the legal right to know clearly granted to consumers by the Consumer Rights Protection Law (hereinafter referred to as the "Consumer Law").
In addition, Article 11 of the new "Implementation Regulations of the Consumer Rights and Interests Protection Law" (hereinafter referred to as the "Implementation Regulations") also clearly stipulates that operators shall not use technical means to force or covertly force consumers to receive services and restrict consumers' autonomy. choose. Safety tips with unclear standards convey the message that "mobile phone applications from other channels have security risks" in disguise, which may mislead or affect consumers' choices, preventing the full exercise of the right of choice conferred by the Consumer Law and the Implementation Regulations. .
The Shanghai Consumer Rights Protection Foundation calls on relevant departments to further pay attention to various phenomena and problems in current application software downloads, clarify the responsible parties for App security review, and create a consumption environment with a greater sense of gain, satisfaction, and happiness for consumers. and consumption experience.

The above is the detailed content of Shanghai Consumer Protection Commission: Manufacturers cannot use permissions to impose unreasonable restrictions on software from other channels, and consumers have the right to know. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Behind the first Android access to DeepSeek: Seeing the power of womenBehind the first Android access to DeepSeek: Seeing the power of womenMar 12, 2025 pm 12:27 PM

The rise of Chinese women's tech power in the field of AI: The story behind Honor's collaboration with DeepSeek women's contribution to the field of technology is becoming increasingly significant. Data from the Ministry of Science and Technology of China shows that the number of female science and technology workers is huge and shows unique social value sensitivity in the development of AI algorithms. This article will focus on Honor mobile phones and explore the strength of the female team behind it being the first to connect to the DeepSeek big model, showing how they can promote technological progress and reshape the value coordinate system of technological development. On February 8, 2024, Honor officially launched the DeepSeek-R1 full-blood version big model, becoming the first manufacturer in the Android camp to connect to DeepSeek, arousing enthusiastic response from users. Behind this success, female team members are making product decisions, technical breakthroughs and users

DeepSeek's 'amazing' profit: the theoretical profit margin is as high as 545%!DeepSeek's 'amazing' profit: the theoretical profit margin is as high as 545%!Mar 12, 2025 pm 12:21 PM

DeepSeek released a technical article on Zhihu, introducing its DeepSeek-V3/R1 inference system in detail, and disclosed key financial data for the first time, which attracted industry attention. The article shows that the system's daily cost profit margin is as high as 545%, setting a new high in global AI big model profit. DeepSeek's low-cost strategy gives it an advantage in market competition. The cost of its model training is only 1%-5% of similar products, and the cost of V3 model training is only US$5.576 million, far lower than that of its competitors. Meanwhile, R1's API pricing is only 1/7 to 1/2 of OpenAIo3-mini. These data prove the commercial feasibility of the DeepSeek technology route and also establish the efficient profitability of AI models.

Top 10 Best Free Backlink Checker Tools in 2025Top 10 Best Free Backlink Checker Tools in 2025Mar 21, 2025 am 08:28 AM

Website construction is just the first step: the importance of SEO and backlinks Building a website is just the first step to converting it into a valuable marketing asset. You need to do SEO optimization to improve the visibility of your website in search engines and attract potential customers. Backlinks are the key to improving your website rankings, and it shows Google and other search engines the authority and credibility of your website. Not all backlinks are beneficial: Identify and avoid harmful links Not all backlinks are beneficial. Harmful links can harm your ranking. Excellent free backlink checking tool monitors the source of links to your website and reminds you of harmful links. In addition, you can also analyze your competitors’ link strategies and learn from them. Free backlink checking tool: Your SEO intelligence officer

Midea launches its first DeepSeek air conditioner: AI voice interaction can achieve 400,000 commands!Midea launches its first DeepSeek air conditioner: AI voice interaction can achieve 400,000 commands!Mar 12, 2025 pm 12:18 PM

Midea will soon release its first air conditioner equipped with a DeepSeek big model - Midea fresh and clean air machine T6. The press conference is scheduled to be held at 1:30 pm on March 1. This air conditioner is equipped with an advanced air intelligent driving system, which can intelligently adjust parameters such as temperature, humidity and wind speed according to the environment. More importantly, it integrates the DeepSeek big model and supports more than 400,000 AI voice commands. Midea's move has caused heated discussions in the industry, and is particularly concerned about the significance of combining white goods and large models. Unlike the simple temperature settings of traditional air conditioners, Midea fresh and clean air machine T6 can understand more complex and vague instructions and intelligently adjust humidity according to the home environment, significantly improving the user experience.

Another national product from Baidu is connected to DeepSeek. Is it open or follow the trend?Another national product from Baidu is connected to DeepSeek. Is it open or follow the trend?Mar 12, 2025 pm 01:48 PM

DeepSeek-R1 empowers Baidu Library and Netdisk: The perfect integration of deep thinking and action has quickly integrated into many platforms in just one month. With its bold strategic layout, Baidu integrates DeepSeek as a third-party model partner and integrates it into its ecosystem, which marks a major progress in its "big model search" ecological strategy. Baidu Search and Wenxin Intelligent Intelligent Platform are the first to connect to the deep search functions of DeepSeek and Wenxin big models, providing users with a free AI search experience. At the same time, the classic slogan of "You will know when you go to Baidu", and the new version of Baidu APP also integrates the capabilities of Wenxin's big model and DeepSeek, launching "AI search" and "wide network information refinement"

Prompt Engineering for Web DevelopmentPrompt Engineering for Web DevelopmentMar 09, 2025 am 08:27 AM

AI Prompt Engineering for Code Generation: A Developer's Guide The landscape of code development is poised for a significant shift. Mastering Large Language Models (LLMs) and prompt engineering will be crucial for developers in the coming years. Th

Building a Network Vulnerability Scanner with GoBuilding a Network Vulnerability Scanner with GoApr 01, 2025 am 08:27 AM

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software