Hey I am on Medial • 1y
Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates with device named "B" to verify the password. This device instead of giving the password directly communicates with device "C" which in turn passes the password to device "A" directly for verification. This way the data is stored on the devices of daily users and it also adds a super high data security. The data instead of being stored at the hands of large data giants is completely safe with different fellow users like you. So your data is not used without permission and is also not for sale. What do you think guys ? Ik it is difficult to implement but if implemented in the right way wouldn't it be completely revolutionary idea ?
•
Dual Infotech Group • 9m
A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st
See MoreCHAIRMAN - BITEX IND... • 1y
★ Cellebrite startup was established in Israel in 1999 by Avi Yablonka . With this device you can access any mobile phone in the world even our goverment agencies like ED , CBI , RAW is using this device to extract data from criminals phones even s
See MoreHey I am on Medial • 2m
Business Idea: Refebrus Mobile – Smart Deals, Secured Devices Tagline: Buy Smart. Sell Safe. Stay Secured. What We Do: Refebrus Mobile is a trusted platform where users can sell old mobile phones and accessories, buy quality refurbished mobiles, an
See MoreCyber Security Stude... • 12m
Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including
See MoreFounder of VistaSec:... • 4m
🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹
See MoreKeen Learner and Exp... • 7m
Remember 2016's Pokemon Go craze? well congratulations you have contributed significantly in training Niantic's LGM AI model. This data collected from millions of users help robots and devices to navigate and interact with the physical world. Moral
See More"Turning visions int... • 17d
wtf...🤯 ZEPTO Hack or Trap? 😳 You must have heard about pricing parity in devices in shopping apps. I didn’t use to believe it, but I tried it....and surely enough, different prices 😮 Device 1: Z Fold 6 ... 250gm bhindi ... ₹50 Device 2: iPhone
See MoreDownload the medial app to read full posts, comements and news.