Published in


84 Apps Accused by CAC — DApps Reveal Its Potential Value

The news of “84 Apps Accused by CAC” became a trending topic on the microblog recently. These APPs were accused of illegal acquisition, excessive collection, excessive requests for authorization and unauthorized use of personal information. The Cyberspace Administration of China (CAC) ordered the relevant App operators to rectify their actions within 15 days. Otherwise, they will face punishment in accordance with the law.

These applications involved 36 security management APPs like Tencent mobile manager and 48 P2P lending APPs like “360 Jietiao”, which are all mostly used Apps in people’s daily life. This proves that information leakage may happen at clicking a test link, connecting to a public wifi, downloading Apps, displaying on a social platform, or replacing a mobile phone and so on.

Obviously, the protection of information security cannot only passively rely on the supervision and punishment of relevant departments. It should mobilize sufficient social resources for positive protection. DApp can not only avoid the risk of privacy disclosure technically, but also greatly reduce the cost of social operation.

Differently from traditional APP, DAPP is not run or controlled by any centralized entities. Instead, DApp runs on a distributed computing system and adopts decentralized governance, so the decision-making process must be validated by a large number of users. Furthermore, DApp is built on a public chain, so the stored data and assets are not easily affected by failure of a single point. The encryption and validation scheme ensures the data security on the blockchain.

Good Data Foundation (GDF) has created the blockchain platform called “GoodData” for protecting data privacy, promoting data federation and mining data value. This public chain uses privacy protection, Machine Learning, Secure Multi-Party Computation and other encryption techniques to achieve secure and private transactions. The decision-making process is implemented by GoodData through the algorithm of its consensus mechanism (Proof of Reputation, PoR). The nodes will continuously contribute to the GoodData network so as to ensure the data security of the network.

Based on social needs, GoodData has brought together a sophisticated international team in Silicon Valley (including senior experts in blockchain R & D technology, data and security, artificial intelligence and machine learning, senior technical leaders of Microsoft and Google, and engineers from Stanford, Oxford, Carnegie Mellon and other world-renowned universities). We are working hard to build a “new infrastructure” for the digital economy era to establish a new-generation global data privacy protection blockchain system and shared by all different industries.

After the official launch of GoodData, it will bring a safe, trusted and efficient underlying layer for decentralized application deployment, and trigger more and more new DApps or applications, so as to further improve the safe interaction between users and mobile applications and gradually avoid the leaking of privacy from APP.



Official website:



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store