Back

Anonymous

Anonymous

Hey I am on Medial • 1y

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates with device named "B" to verify the password. This device instead of giving the password directly communicates with device "C" which in turn passes the password to device "A" directly for verification. This way the data is stored on the devices of daily users and it also adds a super high data security. The data instead of being stored at the hands of large data giants is completely safe with different fellow users like you. So your data is not used without permission and is also not for sale. What do you think guys ? Ik it is difficult to implement but if implemented in the right way wouldn't it be completely revolutionary idea ?

7 replies9 likes
Replies (7)

More like this

Recommendations from Medial

sujit singh

 • 

Dual Infotech Group • 5m

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
0 replies2 likes
Image Description

SHIV DIXIT

CHAIRMAN - BITE INDU... • 11m

★ Cellebrite startup was established in Israel in 1999 by Avi Yablonka . With this device you can access any mobile phone in the world even our goverment agencies like ED , CBI , RAW is using this device to extract data from criminals phones even s

See More
1 replies6 likes
3

digitalspy

Are you really safe ... • 10m

In 2023, a new vulnerability was discovered in Bluetooth that may allow unauthenticated HID Device to initiate and establish an encrypted connection. ---------------Bluetooth hacking---------------- If this happens, the HID device may be able t

See More
0 replies7 likes
1

Vasvi Seth

Cyber Security Stude... • 8m

Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including

See More
0 replies5 likes
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 1m

🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹

See More
4 replies7 likes
Image Description
Image Description

Sanskar

Keen Learner & Explo... • 4m

Remember 2016's Pokemon Go craze? well congratulations you have contributed significantly in training Niantic's LGM AI model. This data collected from millions of users help robots and devices to navigate and interact with the physical world. Moral

See More
3 replies2 likes

Comet

#uiux designer #free... • 2m

Wi-Fi from a PC 💻 without a router! If you have a device 💻 with a Windows 10 version, you can activate the Internet distribution directly from your PC. ✅ Click "Start" - "Settings" - "Network and Internet" — "Mobile Hotspot". The network name and

See More
0 replies4 likes

Priyansh Khimani

AI Automation | Grow... • 25d

🚨 Breaking Tech Update The U.S. begins its crackdown on DeepSeek — a Chinese AI chatbot app — with Texas becoming the first state to officially ban the app from government devices. Texas Governor Greg Abbott expressed serious national security con

See More
0 replies3 likes
Image Description
Image Description

AjayEdupuganti

Hey I am on Medial • 12m

Is going through ur chats or tracking ur activity on browser To offer betters ads bad? Arent they showing relevant and different options? anyways all ur data is stored in databases with hashing so nobody actually knows who u r in the ocean of users.

See More
22 replies13 likes

Comet

#uiux designer #free... • 2m

Encrypt your data  You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally. My laptop hard drive has been encrypte

See More
0 replies3 likes

Download the medial app to read full posts, comements and news.