Back

Anonymous

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More

Maitreya Bhatkhande

....ย โ€ขย 1y

Benifits :- 1. Your data will not be used without your concern 2. Your wont be stored at one place. 3. It would be really hard to hack the data. The hacker wont be able to perform MITM attacks. The hacker will have to trace the data from one device to another and even after doing so he will have olnly fragments of data. 4. Almost all of our data is stored with tech giants which is used by them without our concern for various other purposes than providing a "better experiences".This can be put to an end . 5. There would be absolutely no need of maintaining capital intensive data centres. Consider that your are trying to log on to a website. The website to verify the password you have entered instead of directly sending a request to a server sends a request to a device. The device in turn has the address of another device which has your password stored in an encrypted format. This 3rd device will now directly send the encrypted hash to your device from which you are trying to log on.

0 replies

More like this

Recommendations from Medial

Anonymous
Image Description
Image Description

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More
7 replies9 likes

Comet

#freelancerย โ€ขย 4m

Encrypt your dataย  You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally. My laptop hard drive has been encrypte

See More
0 replies3 likes

sujit singh

ย โ€ขย 

Dual Infotech Groupย โ€ขย 7m

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
0 replies2 likes

digitalspy

Are you really safe ...ย โ€ขย 12m

In 2023, a new vulnerability was discovered in Bluetooth that may allow unauthenticated HID Device to initiate and establish an encrypted connection. ---------------Bluetooth hacking---------------- If this happens, the HID device may be able t

See More
0 replies7 likes
1
Image Description
Image Description

Mayank Kumar

Strategy & Product @...ย โ€ขย 10m

Personally i feel tesla wont be able to succeed on india roads! Your thoughts?

13 replies15 likes
1
Anonymous
Image Description
Image Description

how are you confident that your business idea wont be stolen???

12 replies3 likes
Image Description
Image Description

Shubham Khandelwal

Data Science Enthusi...ย โ€ขย 10m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? ๐Ÿ˜•

2 replies5 likes
Image Description
Image Description

Yashab alam

Founder ZehraSecย โ€ขย 18d

Ever found a random USB and your inner hacker whispered, 'Plug it in... whatโ€™s the worst that could happen?' ๐Ÿ˜ˆ๐Ÿ’ป While curiosity fuels innovation, cybersecurity isnโ€™t a gamble. That innocent-looking device? It could be a cybercriminalโ€™s playgroun

See More
4 replies26 likes
1
Image Description
Image Description

Karan Sahu

Founderย โ€ขย 5m

The social comparison and influence paradigm of social networks needs to be rethought. India's ban on social media will create numerous opportunities for indigenous startups, as well as ensure that Indian data is stored on Indian servers and used in

See More
4 replies6 likes
Image Description
Image Description

Shuvodip Ray

Never compromise wit...ย โ€ขย 1m

๐Ÿ›ก๏ธ Using the same password everywhere is a big mistake! Letโ€™s say you use 'Raju123' for Netflix and Gmail. A hacker gets it from Netflixโ€”maybe with a tool like Hydra, which guesses passwords fast. They check your Netflix profile, see your Gmail ID

See More
7 replies9 likes
1

Download the medial app to read full posts, comements and news.