Post on Medial

Anonymous

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More

Pranav Alonay

StealthĀ ā€¢Ā 9m

I think this whole facad of protecting your data is bs, no offence, but I don't think that big companies having your data is actually harmful for you (unless there is a leak) they just want your data so they can show you personalised ads and i am not completely bothered by it too, so I don't think this idea is viable, I mean the blockchain works at the same principle and we all know what happened to that, for these reasons, I am outšŸ˜‚

3 replies3 likes
Replies (3)

More like this

Recommendations from Medial

Image Description
Image Description

Shubham Khandelwal

StealthĀ ā€¢Ā 4m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? šŸ˜•

2 replies5 likes
Anonymous
Image Description
Image Description

WhatsApp exports your user data every night. Some people still think it is secure. X - elonmusk

10 replies14 likes
1
Image Description
Image Description

PRATHAM

Ā ā€¢Ā 

AppleĀ ā€¢Ā 8m

As The Data thing is growing ( context: giants are buying Data of users ) so opportunities on data science will be increasing soon and demand will increase soon as I feel. for example data analyst, data engineer, data scientist, etc. I think it's

See More
5 replies17 likes

Saksham

Ā ā€¢Ā 

BebyondĀ ā€¢Ā 2m

Copyright law is the key to protecting your music, controlling its use, and securing revenue. Learn how to safeguard your creative rights today!

0 replies3 likes
Image Description

Vasvi Seth

StealthĀ ā€¢Ā 6m

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 replies5 likes

Why

StealthĀ ā€¢Ā 7m

How many of you know about "The first principle thinking" or reasoning from first principle? While the concept is pretty clear but I want to utilize it in my day to day life. Any advice?

0 replies4 likes
Image Description
Image Description

DIVYANSHU MHATRE

StealthĀ ā€¢Ā 5m

I am coming for your data

2 replies12 likes
Image Description
Image Description

ReepinderGoyal

StealthĀ ā€¢Ā 7m

Tell me in 2 lines how your startup is solving a particular problem. Whosoever's answer is best will get a personalised content planner from me

25 replies13 likes

Vasvi Seth

StealthĀ ā€¢Ā 3m

šŸ”’ Principle of Least Privilege: Enhancing Security and EfficiencyšŸ”’ In cybersecurity, the Principle of Least Privilege (PoLP) is paramount. It means granting users only the minimal access necessary to perform their tasks. By limiting permissions, w

See More
0 replies6 likes

Saksham

StealthĀ ā€¢Ā 6m

Want to ensure your brand recognition soars across the Canadian market? Protecting your trademark is a crucial first step. This guide dives deep into the Canadian trademark registration process, making sure your brand is safe from imitators and confu

See More
0 replies3 likes

Download the medial app to read full posts, comements and news.