


Let's talk in depth about the front-end's idea of limiting user screenshots
When working on back-end systems or projects where copyright is important, products often raise such requirements: Can users be prohibited from taking screenshots? Experienced developers will not reject the product directly, but will guide it.
First understand what are the initial requirements? The content data is too sensitive and leakage is strictly prohibited. Or after the content is leaked, the source needs to be traced and held accountable. Different needs require different solutions. Let’s take a look at restricting users’ screenshots. What are your ideas? [Recommendation: web front-end tutorial]
What kind of ideas are there
V website and some big guys on the website have given a lot of ideas Hole, I added some more ideas.
1. Basic solution to prevent right-click saving and dragging.
This solution is the most basic, and currently it can only block some novice users. If it is a browser, call up the console in minutes and find the image URL directly. You can also directly ctrl p to enter print mode, save it directly and then cut it.
2. Add a mask layer after defocusing
This solution is a bit interesting. When viewing sensitive information, you must click on a certain button with the mouse. , the photo will be fully displayed. If the focus is lost, the image will be displayed incompletely or directly covered with a mask.
3. High-speed dynamic mosaic
This solution is feasible and has been applied on some websites to randomly display videos or pictures. By inserting pixels and running around dynamically, for customers, a complete image is displayed on the screen at every moment, and the user relies on their visual residue to view pictures or videos. Even taking a photo with a mobile phone can’t capture it completely. There are still many points that need optimization in practical applications. For example, you can see the complete content by recording on your mobile phone, but it only increases the cost of taking screenshots.
The following is the effect of a plan on Zhihu.
Original address: https://www.zhihu.com/question/417108591/answer/1450568587
## Serious needs vs solutions
In fact, the solution of restricting users to take screenshots is unreasonable unless the entire device is customized and the screenshot function is castrated in the software. Adding more complex functions to this requirement is a bit putting the cart before the horse for some requirements that are not so high in security.Let’s talk about the serious solution:
1. For sensitive data or pictures in the background system, the main reason is to worry about leakage, you can use a 45-degree oblique seven-color watermark. If you want It's almost impossible to remove it completely, it just looks bad. 2. For image copyright, you can use the current mainstream blind watermark. I have seen the service provided by Tencent Cloud before. Of course, the cost is relatively high. If the copyright demand is large, the effect is better. 3. Video solution, when tiktok is downloaded, there will be a watermark running around. Of course, this is a processed video, not the original painting, and the image quality loss is relatively high. Video websites such as Netflix use server-side permission control. For video streaming, encrypted videos are downloaded each time they are played, and a short-term license is obtained. After obtaining the license, they are decrypted and played locally. Once the playback is stopped, the license becomes invalid. In short, except for low-level functions such as the screenshot API provided by Android, other functions are not perfect. Even if the bottom layer is controlled, you can still take photos and videos. There is no perfect solution. But it can still be done relatively safely.The above is the detailed content of Let's talk in depth about the front-end's idea of limiting user screenshots. For more information, please follow other related articles on the PHP Chinese website!

Understanding how JavaScript engine works internally is important to developers because it helps write more efficient code and understand performance bottlenecks and optimization strategies. 1) The engine's workflow includes three stages: parsing, compiling and execution; 2) During the execution process, the engine will perform dynamic optimization, such as inline cache and hidden classes; 3) Best practices include avoiding global variables, optimizing loops, using const and lets, and avoiding excessive use of closures.

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

Python and JavaScript have their own advantages and disadvantages in terms of community, libraries and resources. 1) The Python community is friendly and suitable for beginners, but the front-end development resources are not as rich as JavaScript. 2) Python is powerful in data science and machine learning libraries, while JavaScript is better in front-end development libraries and frameworks. 3) Both have rich learning resources, but Python is suitable for starting with official documents, while JavaScript is better with MDNWebDocs. The choice should be based on project needs and personal interests.

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

JavaScript's applications in the real world include server-side programming, mobile application development and Internet of Things control: 1. Server-side programming is realized through Node.js, suitable for high concurrent request processing. 2. Mobile application development is carried out through ReactNative and supports cross-platform deployment. 3. Used for IoT device control through Johnny-Five library, suitable for hardware interaction.

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function