Post on Medial

Is there a market for an end-to-end encrypted photo backup solution, similar to Google Photos but with privacy? Are people willing to pay for such a service?

Priyam Maurya

Stealth • 3m

Is it true that there's nothing end to end encryption. Companies already have our data. End to end encryption only helps to keep our data safe from hackers?

1 replies
Replies (1)

More like this

Recommendations from Medial

Image Description
Image Description

Vagle

Stealth • 12d

Security Managers: The people who keep your data safe... and their bank accounts full

6 replies7 likes
2
Image Description
Image Description

Sameer Patel

Stealth • 4m

User privacy concerns on telegram. Telegram founder Pavel Durov revealed in an interview that the company employs only "about 30 engineers," which has raised concerns among security experts. Telegram, unlike Signal, does not default to end-to-end e

See More
8 replies4 likes

Aayush Tripathi

 • 

YouTube • 4m

Hackers can walk right into a coffee shop, hack the free WiFi, and steal your passwords in minutes. Follow these three tips to help keep your network protected when you're working outside of the office. #hackers #databreach #ITbusiness #Techtips

See More
0 replies2 likes
Image Description

Raghu

Stealth • 5m

Is it really safe for startups to depend on cloud storage? My answer is below 👇🏻 "Cloud storage can be a boon for startups, offering scalability and accessibility. However, it's not without risks. Data breaches, downtime, and compliance issues are

See More
1 replies5 likes
Image Description
Image Description

Vaibhav Gupta

Stealth • 3m

In the tourism sector there is no major player that provides end to end tourism services and personalized travel pakages So my idea is to create a platform that helps customers with end to end tourism service.

2 replies3 likes

Vasvi Seth

Stealth • 6m

🔒 Cybersecurity, also known as security, is paramount in today's digital age. It's the practice of safeguarding the confidentiality, integrity, and availability of information by fortifying networks, devices, and data against unauthorized access o

See More
0 replies4 likes

TenderAlert

Stealth • 6m

Students data leak Every year there 1cr of stufents data the data coming to the consultant .They getting the data from the official boards like sbtet , educational department 🏬 polytechnic,NEET ,Emcet,jee,PG, Intermediate,doctorate,btech ,not everyo

See More
0 replies4 likes
Image Description
Image Description

Numan Shaikh

Stealth • 6m

I am building an AI/ML Deeptech startup which helps developers to generate front end back codes with 100% debugged capability as it's generated from our own custom modules and not from any generative AI products out in the model. It helps developers,

See More
11 replies16 likes
Image Description
Image Description

Somraj

 • 

Finicate • 5m

So, today our "Startup Blueprint" series comes to an end. Are they were beneficial to you ?

4 replies4 likes
Image Description

Tanay Shandilya

Stealth • 7m

So here is an idea I got while stuck in traffic… What if I can create a DbaaS product that has built in features like data anonymisation, pseudonymsation, built in data record encryption, masking woth custom masking markers and can provide analytics

See More
1 replies5 likes
1

Download the medial app to read full posts, comements and news.