Post on Medial

Anonymous

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More

Maitreya Bhatkhande

StealthĀ ā€¢Ā 9m

Benifits :- 1. Your data will not be used without your concern 2. Your wont be stored at one place. 3. It would be really hard to hack the data. The hacker wont be able to perform MITM attacks. The hacker will have to trace the data from one device to another and even after doing so he will have olnly fragments of data. 4. Almost all of our data is stored with tech giants which is used by them without our concern for various other purposes than providing a "better experiences".This can be put to an end . 5. There would be absolutely no need of maintaining capital intensive data centres. Consider that your are trying to log on to a website. The website to verify the password you have entered instead of directly sending a request to a server sends a request to a device. The device in turn has the address of another device which has your password stored in an encrypted format. This 3rd device will now directly send the encrypted hash to your device from which you are trying to log on.

0 replies

More like this

Recommendations from Medial

Anonymous
Image Description
Image Description

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More
7 replies9 likes

sujit singh

Ā ā€¢Ā 

Dual Infotech GroupĀ ā€¢Ā 1m

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
0 replies2 likes

digitalspy

StealthĀ ā€¢Ā 6m

In 2023, a new vulnerability was discovered in Bluetooth that may allow unauthenticated HID Device to initiate and establish an encrypted connection. ---------------Bluetooth hacking---------------- If this happens, the HID device may be able t

See More
0 replies7 likes
1
Image Description
Image Description

Mayank Kumar

StealthĀ ā€¢Ā 4m

Personally i feel tesla wont be able to succeed on india roads! Your thoughts?

13 replies15 likes
1
Image Description
Image Description

Shubham Khandelwal

StealthĀ ā€¢Ā 4m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? šŸ˜•

2 replies5 likes
Anonymous
Image Description
Image Description

how are you confident that your business idea wont be stolen???

12 replies3 likes
Anonymous
Image Description

A bottle of whiskey can be stored for 100+ years without losing the taste of the drink

1 replies3 likes
Anonymous
Image Description
Image Description

What's your views on this?? I get the intention of axis Bank to revive the ancient languages.But... While I watching this I thought the passwords can be inscribed in sanskrit but it generates the password in english but with Sanskrit word. What if

See More
12 replies9 likes
2
Anonymous

šŸ‘ Robot Vacuums are Spying on you. šŸšØ The Chinese company Ecovacs, which makes Deebot robot vacuums, collects photos, videos, and audio recordings from peopleā€™s homes to train its AI models. It turns out that users themselves agree to this just by

See More
0 replies6 likes
Image Description

Praveena J

StealthĀ ā€¢Ā 7m

Just thought:- Is there any very small device or something very small which has GPS tracking along with the small battery capacity that can be attached to the smartphones without making any difference in the design of them. I personally feel that, w

See More
2 replies3 likes

Download the medial app to read full posts, comements and news.