Back to feeds

Is there a market for an end-to-end encrypted photo backup solution, similar to Google Photos but with privacy? Are people willing to pay for such a service?

Priyam Maurya

Stealth • 5m

Is it true that there's nothing end to end encryption. Companies already have our data. End to end encryption only helps to keep our data safe from hackers?

1 replies
Replies (1)

More like this

Recommendations from Medial

Image Description
Image Description

Vagle

Stealth • 2m

Security Managers: The people who keep your data safe... and their bank accounts full

6 replies9 likes
2

Etchno

Stealth • 18d

"Attention all Android users! 🚨 Protecting your device from hackers and scammers is crucial in today's digital world. 💻📲 Stay ahead of the game with these top tips to keep your Android safe and secure. Check out our latest article for all the deta

See More
0 replies3 likes
Image Description
Image Description

Sameer Patel

Stealth • 7m

User privacy concerns on telegram. Telegram founder Pavel Durov revealed in an interview that the company employs only "about 30 engineers," which has raised concerns among security experts. Telegram, unlike Signal, does not default to end-to-end e

See More
8 replies4 likes

Aayush Tripathi

 • 

YouTube • 6m

Hackers can walk right into a coffee shop, hack the free WiFi, and steal your passwords in minutes. Follow these three tips to help keep your network protected when you're working outside of the office. #hackers #databreach #ITbusiness #Techtips

See More
0 replies2 likes
Image Description
Image Description

Vaibhav Gupta

Stealth • 5m

In the tourism sector there is no major player that provides end to end tourism services and personalized travel pakages So my idea is to create a platform that helps customers with end to end tourism service.

2 replies3 likes
Image Description

Raghu

Stealth • 7m

Is it really safe for startups to depend on cloud storage? My answer is below 👇🏻 "Cloud storage can be a boon for startups, offering scalability and accessibility. However, it's not without risks. Data breaches, downtime, and compliance issues are

See More
1 replies5 likes

Varun Jeph

 • 

The NineHertz • 24d

⚠️ New phishing scam targets crypto users A Trojan horse malware decrypts data, steals credentials, and sends them to hackers, allowing full access to victims’ crypto wallets through fake Zoom links.

0 replies2 likes

Vasvi Seth

Stealth • 8m

🔒 Cybersecurity, also known as security, is paramount in today's digital age. It's the practice of safeguarding the confidentiality, integrity, and availability of information by fortifying networks, devices, and data against unauthorized access o

See More
0 replies4 likes

ADK Consultancy

Stealth • 1m

We are providing end to end service which help to grow Your Business, Use our 18+ Years of Experience in Your Business

0 replies

TenderAlert

Stealth • 8m

Students data leak Every year there 1cr of stufents data the data coming to the consultant .They getting the data from the official boards like sbtet , educational department 🏬 polytechnic,NEET ,Emcet,jee,PG, Intermediate,doctorate,btech ,not everyo

See More
0 replies4 likes

Download the medial app to read full posts, comements and news.