A recent incident has sparked discussion regarding mobile number recycling and account security. Netizens discovered that a newly registered mobile phone number granted access to the NetEase Cloud Music account of the late singer,Coco lee.
Account Access and NetEase’s Response
Table of Contents
- 1. Account Access and NetEase’s Response
- 2. Understanding Mobile Number Recycling
- 3. Carrier Policies on Number Reassignment
- 4. Implications for Account security
- 5. The Growing Concern of Account Security
- 6. Frequently Asked Questions About Mobile Number Recycling
- 7. What security measures can music streaming platforms implement to prevent accidental account access like the one experienced with Coco Li’s NetEase Cloud Music account?
- 8. Accidental Log-In to Coco Li’s Account on NetEase Cloud music Leads to Double Account Release
- 9. The Incident: A User’s Unexpected Access
- 10. how the Accidental Log-In Occurred
- 11. The Double Account Release: NetEase Cloud Music’s Response
- 12. Implications for Music Streaming platforms & Users
- 13. The role of Digital Legacy Planning
Reports surfaced on October 11th detailing how a user registering for NetEase Cloud Music found themselves logged into Coco Lee’s account. NetEase Cloud Music’s customer service team confirmed the issue, attributing it to the reassignment of a mobile phone number previously linked to the artist’s account by the telecommunications provider. The company stated that they promptly contacted the new account holder to resolve the situation.
Understanding Mobile Number Recycling
The practice of “secondary number allocation” involves mobile carriers reclaiming deactivated or abandoned phone numbers. After a designated period, these numbers are re-released to new users. This process addresses the growing demand for mobile numbers and efficiently manages available resources. Li Meilin, known professionally as Coco Lee, was born on January 17, 1975, in Wuhan, Hubei Province, and tragically passed away on July 2, 2023, at the age of 48.
Carrier Policies on Number Reassignment
Each of China’s major mobile carriers – China Mobile, China Unicom, and China Telecom – follows a similar procedure for number reassignment. numbers that remain inactive for an extended period, typically three to six months, and have outstanding balances are eligible for recycling. Here’s a breakdown of each carrier’s policy:
| Carrier | Inactive Period | Recycling Period |
|---|---|---|
| China Mobile | 90 days (plus 3 months of arrears) | 90 days |
| China Unicom | 3 months | 90 days after cancellation |
| China Telecom | 90 days | 90 days |
Did You Know? mobile number recycling is a common practice globally, intended to optimize the use of a finite resource. However, it raises important privacy and security concerns.
the timing of when recycled numbers are made available again varies, with carriers typically holding them for a sealing period before re-listing them.
Implications for Account security
This incident underscores the importance of robust account security measures. Users should consider utilizing multi-factor authentication and regularly reviewing the security settings of their online accounts. It also highlights the potential vulnerabilities associated with relying solely on mobile phone numbers for account verification.
Pro Tip: Regularly update your account recovery information and enable two-factor authentication wherever available to enhance your online security.
The Growing Concern of Account Security
The Coco Lee incident isn’t isolated. Throughout 2024, various reports surfaced detailing similar issues where recycled phone numbers led to unintended account access. Experts emphasize the need for more secure account recovery processes that don’t solely rely on easily transferable information like phone numbers. The industry is exploring alternatives like blockchain-based identity verification and biometric authentication to address these growing vulnerabilities.
Frequently Asked Questions About Mobile Number Recycling
- What is mobile number recycling? It’s the process where telecommunications companies reclaim unused phone numbers and reassign them to new customers.
- How long does a number need to be inactive before it’s recycled? Typically, a number must be inactive for 3 to 6 months and possibly have outstanding balances.
- What are the risks associated with number recycling? potential risks include unintended access to previous owner’s accounts and privacy concerns.
- Can I prevent my number from being recycled? Keep your account active and pay your bills to avoid number reassignment.
- What steps can I take to protect my online accounts? Enable multi-factor authentication and regularly update your account recovery options.
- Is this issue unique to China? No, mobile number recycling and its associated security risks are global concerns.
- What did NetEase Cloud Music do to address this specific situation? the company contacted the new account holder to resolve the issue and regain control of the account.
What are your thoughts on this situation? Do you think carriers should implement stricter security measures when recycling numbers? Share your opinions in the comments below!
What security measures can music streaming platforms implement to prevent accidental account access like the one experienced with Coco Li’s NetEase Cloud Music account?
Accidental Log-In to Coco Li’s Account on NetEase Cloud music Leads to Double Account Release
The Incident: A User’s Unexpected Access
In a surprising turn of events, a NetEase Cloud Music user inadvertently gained access to the verified account belonging to the late singer, Coco Li. The incident, which unfolded in early October 2025, highlighted potential security vulnerabilities within the popular Chinese music streaming platform. The user, identified only as “Xiao Wang” in initial reports, discovered they could log in to Coco Li’s account using their existing credentials after a routine login attempt. This accidental access wasn’t a targeted hack, but rather a confluence of factors related to account linking and session management.
how the Accidental Log-In Occurred
The core issue stemmed from a shared authentication method. Xiao Wang had previously linked their NetEase Cloud music account to a third-party application. Following Coco Li’s passing in July 2023, NetEase Cloud Music initiated a process to preserve her digital legacy on the platform. This involved managing her account access and potentially reconfiguring authentication settings.
Here’s a breakdown of the likely sequence of events:
* Account Linking: Xiao Wang linked their NetEase Cloud Music account to a third-party service for convenience.
* Authentication Token Reuse: The third-party application retained an authentication token valid for NetEase Cloud Music.
* Account Transition & Potential Token Conflict: During the account management transition following Coco Li’s death, a conflict arose with the existing authentication token.
* Accidental Session Hijack: Xiao Wang’s login attempt triggered the reuse of the token, granting them access to Coco Li’s verified account.
This scenario underscores the risks associated with relying on shared authentication methods and the importance of robust session management, especially during sensitive account transitions. the incident sparked discussions about music streaming security, account hijacking, and digital legacy management.
The Double Account Release: NetEase Cloud Music’s Response
Upon realizing the error, Xiao Wang immediately contacted NetEase Cloud Music’s customer support. The platform responded swiftly, acknowledging the issue and initiating a full inquiry. Crucially, NetEase cloud Music didn’t simply revoke access. They took a more nuanced approach:
- Immediate Access Revocation: Xiao Wang’s access to Coco Li’s account was immediately terminated.
- Account Audit: A comprehensive audit of Coco Li’s account activity was conducted to identify any unauthorized changes or data breaches.
- Dual Account Release: NetEase cloud Music created a second verified account for Coco Li, mirroring the original. This ensured her music catalog and artist profile remained accessible to fans without compromising the integrity of the original account,which was then secured for archival purposes.
- Security protocol Review: A thorough review of their authentication and session management protocols was undertaken to prevent similar incidents in the future.
This “double account release” strategy was praised by many as a responsible and respectful way to handle the situation, prioritizing both security and the preservation of Coco li’s musical legacy. It demonstrated a commitment to digital rights management and artist account security.
Implications for Music Streaming platforms & Users
This incident serves as a critical case study for other online music services like Spotify, Apple Music, and QQ Music.Key takeaways include:
* Strengthened Authentication: Implementing multi-factor authentication (MFA) for all verified artist accounts is paramount.
* Robust Session Management: Regularly invalidate and refresh authentication tokens, especially during account transitions.
* Third-Party App Security: Enhance security checks for third-party applications linked to user accounts.
* Account Transition Protocols: Develop detailed and rigorously tested protocols for managing accounts of deceased artists.
* User Education: Educate users about the risks of linking accounts to third-party applications and the importance of strong passwords.
The role of Digital Legacy Planning
Coco Li’s case highlights the