From Paragraph 4, we know that the IT companies usually access the users private information by
A.
hacking users' computers and stealing useful information
B.
requiring real personal information on social networks
C.
making unnoticeable modifications to technical settings
D.
inserting advertisement into websites users browse