Hey I am on Medialย โขย 1y
Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates with device named "B" to verify the password. This device instead of giving the password directly communicates with device "C" which in turn passes the password to device "A" directly for verification. This way the data is stored on the devices of daily users and it also adds a super high data security. The data instead of being stored at the hands of large data giants is completely safe with different fellow users like you. So your data is not used without permission and is also not for sale. What do you think guys ? Ik it is difficult to implement but if implemented in the right way wouldn't it be completely revolutionary idea ?
ย โขย
Dual Infotech Groupย โขย 8m
A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st
See MoreCHAIRMAN - BITEX IND...ย โขย 1y
โ Cellebrite startup was established in Israel in 1999 by Avi Yablonka . With this device you can access any mobile phone in the world even our goverment agencies like ED , CBI , RAW is using this device to extract data from criminals phones even s
See MoreHey I am on Medialย โขย 2m
Business Idea: Refebrus Mobile โ Smart Deals, Secured Devices Tagline: Buy Smart. Sell Safe. Stay Secured. What We Do: Refebrus Mobile is a trusted platform where users can sell old mobile phones and accessories, buy quality refurbished mobiles, an
See MoreAre you really safe ...ย โขย 1y
In 2023, a new vulnerability was discovered in Bluetooth that may allow unauthenticated HID Device to initiate and establish an encrypted connection. ---------------Bluetooth hacking---------------- If this happens, the HID device may be able t
See MoreCyber Security Stude...ย โขย 11m
Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including
See MoreFounder of VistaSec:...ย โขย 4m
๐จ Top IoT Vulnerabilities You Need to Know! ๐จ ๐น Weak Passwords & Default Credentials โ Many IoT devices ship with default passwords that are easy to guess. ๐น Unpatched Firmware โ Outdated software can have security flaws that hackers exploit. ๐น
See MoreKeen Learner and Exp...ย โขย 7m
Remember 2016's Pokemon Go craze? well congratulations you have contributed significantly in training Niantic's LGM AI model. This data collected from millions of users help robots and devices to navigate and interact with the physical world. Moral
See More"Turning visions int...ย โขย 11d
wtf...๐คฏ ZEPTO Hack or Trap? ๐ณ You must have heard about pricing parity in devices in shopping apps. I didnโt use to believe it, but I tried it....and surely enough, different prices ๐ฎ Device 1: Z Fold 6 ... 250gm bhindi ... โน50 Device 2: iPhone
See MoreDownload the medial app to read full posts, comements and news.