Back

Pranav Alonay

studypartnerfinder.c...ย โ€ขย 1y

I think this whole facad of protecting your data is bs, no offence, but I don't think that big companies having your data is actually harmful for you (unless there is a leak) they just want your data so they can show you personalised ads and i am not completely bothered by it too, so I don't think this idea is viable, I mean the blockchain works at the same principle and we all know what happened to that, for these reasons, I am out๐Ÿ˜‚

3 Replies
3
Replies (3)

More like this

Recommendations from Medial

Image Description
Image Description

Shubham Khandelwal

Data Science Enthusi...ย โ€ขย 12m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? ๐Ÿ˜•

2 Replies
5

Devak K

Hey I am on Medialย โ€ขย 4m

Types of Data Breaches in Cyber Security | Digitdefence Understanding the types of data breaches in cyber security is crucial to protecting your business. Knowing these breach methods helps you implement stronger defenses and safeguard sensitive inf

See More
Reply
1
Image Description
Image Description

Mohd Rihan

Studentย โ€ขย 14d

Massive Data Leak Alert: Over 16 billion credentials (usernames & passwords) have been leaked online via logs from infostealer malware like RedLine & Raccoon. These include accounts from Google, Facebook, Apple, and more. Most data is fresh, posing h

See More
5 Replies
11
Image Description
Image Description

PRATHAM

ย โ€ขย 

Appleย โ€ขย 1y

As The Data thing is growing ( context: giants are buying Data of users ) so opportunities on data science will be increasing soon and demand will increase soon as I feel. for example data analyst, data engineer, data scientist, etc. I think it's

See More
5 Replies
17

Saksham

ย โ€ขย 

Bebyondย โ€ขย 9m

Copyright law is the key to protecting your music, controlling its use, and securing revenue. Learn how to safeguard your creative rights today!

Reply
3
Image Description

Vasvi Seth

Cyber Security Stude...ย โ€ขย 1y

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 Replies
5

Neek

Why.ย โ€ขย 1y

How many of you know about "The first principle thinking" or reasoning from first principle? While the concept is pretty clear but I want to utilize it in my day to day life. Any advice?

Reply
4

Vasvi Seth

Cyber Security Stude...ย โ€ขย 11m

๐Ÿ”’ Principle of Least Privilege: Enhancing Security and Efficiency๐Ÿ”’ In cybersecurity, the Principle of Least Privilege (PoLP) is paramount. It means granting users only the minimal access necessary to perform their tasks. By limiting permissions, w

See More
Reply
6

Download the medial app to read full posts, comements and news.