Back

Anonymous

Hello Fellow Medial users !! I have an idea that could completely revolutnalise the overall architecture of data. So here is the idea. Consider 3 android devices, a user named "A" hastko log in to an app. He enters his password. The app communicates

See More

Pranav Alonay

studypartnerfinder.c... • 1y

I think this whole facad of protecting your data is bs, no offence, but I don't think that big companies having your data is actually harmful for you (unless there is a leak) they just want your data so they can show you personalised ads and i am not completely bothered by it too, so I don't think this idea is viable, I mean the blockchain works at the same principle and we all know what happened to that, for these reasons, I am out😂

3 replies3 likes
Replies (3)

More like this

Recommendations from Medial

Anonymous
Image Description

when will Medial build personalised feed? I think it's time.

3 replies4 likes
Image Description
Image Description

Shubham Khandelwal

Data Science Enthusi... • 9m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? 😕

2 replies5 likes

Devak K

Hey I am on Medial • 1m

Types of Data Breaches in Cyber Security | Digitdefence Understanding the types of data breaches in cyber security is crucial to protecting your business. Knowing these breach methods helps you implement stronger defenses and safeguard sensitive inf

See More
0 replies1 like
Image Description
Image Description

PRATHAM

 • 

Apple • 1y

As The Data thing is growing ( context: giants are buying Data of users ) so opportunities on data science will be increasing soon and demand will increase soon as I feel. for example data analyst, data engineer, data scientist, etc. I think it's

See More
5 replies17 likes
Anonymous
Image Description
Image Description

WhatsApp exports your user data every night. Some people still think it is secure. X - elonmusk

10 replies14 likes
1

Saksham

 • 

Bebyond • 6m

Copyright law is the key to protecting your music, controlling its use, and securing revenue. Learn how to safeguard your creative rights today!

0 replies3 likes
Image Description

Vasvi Seth

Cyber Security Stude... • 10m

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 replies5 likes

Neek

Why. • 11m

How many of you know about "The first principle thinking" or reasoning from first principle? While the concept is pretty clear but I want to utilize it in my day to day life. Any advice?

0 replies4 likes

Vasvi Seth

Cyber Security Stude... • 7m

🔒 Principle of Least Privilege: Enhancing Security and Efficiency🔒 In cybersecurity, the Principle of Least Privilege (PoLP) is paramount. It means granting users only the minimal access necessary to perform their tasks. By limiting permissions, w

See More
0 replies6 likes
Image Description
Image Description

ReepinderGoyal

Hungry? DM me • 11m

Tell me in 2 lines how your startup is solving a particular problem. Whosoever's answer is best will get a personalised content planner from me

25 replies13 likes

Download the medial app to read full posts, comements and news.