The underlying technical principles of Amazon’s evaluation of maintenance and prevention associations revealed

Today, I will tell you about some of the underlying technical principles of the imitation environment that need to be used for the Amazon evaluation project. I believe that few people can master the content that I am going to talk about today, and no one else in China is talking about it. They are all foreign technologies.
If you are currently using an anti-association solution or device recommended or sold to you by others, you can see what I told you today when you go back. Is your environment 100% safe? If you can’t do it, then Give up as soon as possible. Even if you spend 10,000 yuan on the equipment, don’t feel a pity, because if you use it wrong, your future loss may be hundreds of thousands or more.
Why do we have to listen to this lesson, because the most important part of the Amazon evaluation project we are going to do is the operating environment of the account, how to prevent association, because Amazon has risk control, and the platform does not want us to be on the same machine Many accounts are registered for operation. If this problem is not solved, most of your account registrations will fail, and even if you successfully register many accounts, one day you will be listed by your brother-in-law, and the whole army may be wiped out by then. , All the work you have done has been lost.
This is the meaning of this class. I believe you have also learned from various channels. What kind of systems are used by colleagues, which are useful for mobile phones and computers. Some students may want to ask, which one? Ok. If you ask me which one is better, I tell you there must be pros and cons. No matter what system you use, you must first understand the underlying principles of anti-correlation so that you can have a clear understanding of the environment you are using.
Before choosing the environment, our team spent a long time studying the underlying technology of imitation association, because we know that every Amazon account is our asset. Think about it, one account is worth several hundred yuan, and you have 1,000 An account, the value is hundreds of thousands. If you don’t have a thorough understanding of the principles, it will lead you to choose the environment. So sooner or later, no matter how many accounts you have, they will be linked together and wait until the entire army is wiped out. It’s too late when we regret it.
Also, at present, few people in China have mastered this technology. It is still in the early stage. Whoever masters it will master the core of the project, and no teacher will tell it. I should be the first to cooperate with the Amazon evaluation project. .
So let’s stop talking nonsense, the course has begun. We all know that Amazon is a shopping website. In the past, it was only available on computer web pages. In recent years, because of the development of the mobile Internet, there have been mobile phones and WAP terminals. The WAP terminal is equivalent to the web pages on the mobile phone. So the question is, whether to use a computer or a mobile phone, which is more secure. In fact, these are not important. Although the mobile Internet has already accounted for most of the traffic, it is very common to use PCs to browse websites in European and American countries. So Amazon doesn’t care about what device you use to browse.
But the browsing environment of each device is different. The information displayed on the mobile phone is less, and the operation efficiency is lower than that of the computer. The large screen of the computer displays a lot of information. Using the mouse and keyboard to operate, our order efficiency Will improve a lot. This is the advantage of the computer.
More than 95% of the systems on the computer side are windows, so there are two systems on the mobile side, one is IOS, which is Apple’s system, and the other is Android. What we need to understand is what information the website can obtain from our client through mobile phones or computers, what their risk control principles are, and what parameters the platform uses to determine the relationship between our accounts.
The reason is very simple. Almost every large platform, especially the financial payment field, will have its own strict anti-cheating risk control mechanism in the e-commerce field. We will leave a lot of systems and networks when registering or operating accounts with equipment. Parameters, including behavioral parameters. The platform’s risk control rules will be compared by collecting the parameters of our client. If some parameters are exactly the same or some behaviors are beyond the scope of normal users, the platform’s risk control mechanism will be triggered, and the account will be punished or even blocked. This is why sometimes our accounts are blocked, or all of them are linked together.
So what exactly is Amazon’s risk control mechanism? This is a trade secret. I believe that few people all over the world know about it. They must have a risk control department that studies this matter every day. If you let you know it easily If they do, then they can’t do it. Our team currently has about 80% of it. No one can understand it 100%, even the technical staff inside Amazon.
The content we have mastered is summed up by testing hundreds of accounts through burning money. Paying for advice from masters, reading ten thousand books is not as good as traveling thousands of miles, and traveling thousands of miles is not as good as expert guidance. Doing business without this spirit is bad.
Today’s class only talks about the technical principles of the environment, not about other things, the environment is the foundation of this project. Let’s go on to say that the platform’s risk control system will collect and compare our information. The windows platform, IOS, and Android mentioned just now are operating systems of different companies. These three different systems will give Amazon different Access to information. For information security, ios>windows>Android. Relatively speaking, IOS is the safest, but not necessarily the best. Please remember. Let’s talk about Apple’s IOS first. Looking at the picture above, Amazon can get the device model, area code, regulatory code, motherboard code, WIFI address, Bluetooth address, cellular address, even color, fingerprint code, fingerprint string through Apple’s mobile phone. Code, battery code, LCD screen code, including front and rear cameras have unique codes. This is just hardware information, as well as software information, including about dozens of parameters, including address book, photo album, GPS location, IP address, etc., as long as you give the APP permission, it can get it.
The Android system is similar, but Apple’s official does not give the software so many permissions, and it is relatively safe. Android is completely open source and basically has no privacy for the APP. Do we see these, do you think it is too much? It is difficult, so much information cannot be completely avoided.
There was a news last year that a certain Dong’s online loan app discovered through packet capture that a lot of user information can be obtained, and even the address book, text messages, and photo albums are regularly uploaded to certain Dong’s server, as long as you borrow money from them, Then you must give them these permissions so that they know all your information, and even your relatives and friends are tired when you don’t pay the money. Everyone will know about your affairs, because he knows himself better than you. I dare to give you money through the website without meeting. Think about how terrible it is. We don’t have personal privacy in the face of technology. Needless to say, even if you give me some information, I can find it even for the eight generations of your ancestors, as long as I want to check you! So try not to do bad things on the Internet, and you will pull the list sooner or later. Sky eyes, face recognition, fingerprint recognition, and Internet records are all indelible.
The following 70% content is not too much to say here, if you are interested, you can contact me through my username, I hope everyone will discuss it together.
In the past year or so, we have spent several months testing the domestic account maintenance system. Basically, the domestic account maintenance environment has been tested. The most popular mobile phone account maintenance system on the market is called one. The mobile phone generates hundreds of thousands of account environment, including virtual machines, simulators, vps, etc. The test found that there are many related parameters, we no longer use them, and do not recommend that you use them, because Amazon buys The home account has market value. If your system cannot guarantee 100% security, it will be too late if you are associated with the account title in the future.

Today, I will tell you about some of the underlying technical principles of the imitation environment that need to be used for the Amazon evaluation project. I believe that few people can master the content that I am going to talk about today, and no one else in China is talking about it. They are all foreign technologies.
If you are currently using an anti-association solution or device recommended or sold to you by others, you can see what I told you today when you go back. Is your environment 100% safe? If you can’t do it, then Give up as soon as possible. Even if you spend 10,000 yuan on the equipment, don’t feel a pity, because if you use it wrong, your future loss may be hundreds of thousands or more.
Why do we have to listen to this lesson, because the most important part of the Amazon evaluation project we are going to do is the operating environment of the account, how to prevent association, because Amazon has risk control, and the platform does not want us to be on the same machine Many accounts are registered for operation. If this problem is not solved, most of your account registrations will fail, and even if you successfully register many accounts, one day you will be listed by your brother-in-law, and the whole army may be wiped out by then. , All the work you have done has been lost.
This is the meaning of this class. I believe you have also learned from various channels. What kind of systems are used by colleagues, which are useful for mobile phones and computers. Some students may want to ask, which one? Ok. If you ask me which one is better, I tell you there must be pros and cons. No matter what system you use, you must first understand the underlying principles of anti-correlation so that you can have a clear understanding of the environment you are using.
Before choosing the environment, our team spent a long time studying the underlying technology of imitation association, because we know that every Amazon account is our asset. Think about it, one account is worth several hundred yuan, and you have 1,000 An account, the value is hundreds of thousands. If you don’t have a thorough understanding of the principles, it will lead you to choose the environment. So sooner or later, no matter how many accounts you have, they will be linked together and wait until the entire army is wiped out. It’s too late when we regret it.
Also, at present, few people in China have mastered this technology. It is still in the early stage. Whoever masters it will master the core of the project, and no teacher will tell it. I should be the first to cooperate with the Amazon evaluation project. .
So let’s stop talking nonsense, the course has begun. We all know that Amazon is a shopping website. In the past, it was only available on computer web pages. In recent years, because of the development of the mobile Internet, there have been mobile phones and WAP terminals. The WAP terminal is equivalent to the web pages on the mobile phone. So the question is, whether to use a computer or a mobile phone, which is more secure. In fact, these are not important. Although the mobile Internet has already accounted for most of the traffic, it is very common to use PCs to browse websites in European and American countries. So Amazon doesn’t care about what device you use to browse.
But the browsing environment of each device is different. The information displayed on the mobile phone is less, and the operation efficiency is lower than that of the computer. The large screen of the computer displays a lot of information. Using the mouse and keyboard to operate, our order efficiency Will improve a lot. This is the advantage of the computer.
More than 95% of the systems on the computer side are windows, so there are two systems on the mobile side, one is IOS, which is Apple’s system, and the other is Android. What we need to understand is what information the website can obtain from our client through mobile phones or computers, what their risk control principles are, and what parameters the platform uses to determine the relationship between our accounts.
The reason is very simple. Almost every large platform, especially the financial payment field, will have its own strict anti-cheating risk control mechanism in the e-commerce field. We will leave a lot of systems and networks when registering or operating accounts with equipment. Parameters, including behavioral parameters. The platform’s risk control rules will be compared by collecting the parameters of our client. If some parameters are exactly the same or some behaviors are beyond the scope of normal users, the platform’s risk control mechanism will be triggered, and the account will be punished or even blocked. This is why sometimes our accounts are blocked, or all of them are linked together.
So what exactly is Amazon’s risk control mechanism? This is a trade secret. I believe that few people all over the world know about it. They must have a risk control department that studies this matter every day. If you let you know it easily If they do, then they can’t do it. Our team currently has about 80% of it. No one can understand it 100%, even the technical staff inside Amazon.
The content we have mastered is summed up by testing hundreds of accounts through burning money. Paying for advice from masters, reading ten thousand books is not as good as traveling thousands of miles, and traveling thousands of miles is not as good as expert guidance. Doing business without this spirit is bad.
Today’s class only talks about the technical principles of the environment, not about other things, the environment is the foundation of this project. Let’s go on to say that the platform’s risk control system will collect and compare our information. The windows platform, IOS, and Android mentioned just now are operating systems of different companies. These three different systems will give Amazon different Access to information. For information security, ios>windows>Android. Relatively speaking, IOS is the safest, but not necessarily the best. Please remember. Let’s talk about Apple’s IOS first. Looking at the picture above, Amazon can get the device model, area code, regulatory code, motherboard code, WIFI address, Bluetooth address, cellular address, even color, fingerprint code, fingerprint string through Apple’s mobile phone. Code, battery code, LCD screen code, including front and rear cameras have unique codes. This is just hardware information, as well as software information, including about dozens of parameters, including address book, photo album, GPS location, IP address, etc., as long as you give the APP permission, it can get it.
The Android system is similar, but Apple’s official does not give the software so many permissions, and it is relatively safe. Android is completely open source and basically has no privacy for the APP. Do we see these, do you think it is too much? It is difficult, so much information cannot be completely avoided.

There was a news last year that a certain Dong’s online loan app discovered through packet capture that a lot of user information can be obtained, and even the address book, text messages, and photo albums are regularly uploaded to certain Dong’s server, as long as you borrow money from them, Then you must give them these permissions so that they know all your information, and even your relatives and friends are tired when you don’t pay the money. Everyone will know about your affairs, because he knows himself better than you. I dare to give you money through the website without meeting. Think about how terrible it is. We don’t have personal privacy in the face of technology. Needless to say, even if you give me some information, I can find it even for the eight generations of your ancestors, as long as I want to check you! So try not to do bad things on the Internet, and you will pull the list sooner or later. Sky eyes, face recognition, fingerprint recognition, and Internet records are all indelible.
The following 70% content is not too much to say here, if you are interested, you can contact me through my username, I hope everyone will discuss it together.
In the past year or so, we have spent several months testing the domestic account maintenance system. Basically, the domestic account maintenance environment has been tested. The most popular mobile phone account maintenance system on the market is called one. The mobile phone generates hundreds of thousands of account environment, including virtual machines, simulators, vps, etc. The test found that there are many related parameters, we no longer use them, and do not recommend that you use them, because Amazon buys The home account has market value. If your system cannot guarantee 100% security, it will be too late if you are associated with the account title in the future.