Back

More like this

Recommendations from Medial

Image Description

Xinetee

Decentralised , Secu...ย โ€ขย 11d

what if you're data could never be Hacked , Leaked , or Altered ?

5 replies2 likes
Image Description

Darsh Singh

Ask me no questions ...ย โ€ขย 10m

Decentralized Social Media on IPFS IPFS provides a decentralized and immutable approach to data storage, much like how blockchain technology decentralizes transactions. Imagine a DeFi platform offering tokenized real estate. By storing property docum

See More
1 replies5 likes
2
Image Description
Image Description

Shubham Khandelwal

Data Science Enthusi...ย โ€ขย 9m

Whome would you believe, A hacker who is claiming on dark web for data leak or the company whose data has been leaked? ๐Ÿ˜•

2 replies5 likes
Anonymous
Image Description
Image Description

Idea: immutable journal app Once you write something, it is stored on Blockchain and time stamped in hash format, and it cannot be changed. The written journal is then time capsuled and can be opened after a week, month, or even a year. It also inclu

See More
5 replies11 likes
1

sujit singh

ย โ€ขย 

Dual Infotech Groupย โ€ขย 6m

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
0 replies2 likes
Anonymous

Just as a caution for a lot of you. When opening a digital Demat account on any investing platform be very careful. Given the poor cyber security environment, the risk of your Kyc being leaked or sold is very much there. Just pathetic and irrespons

See More
0 replies4 likes

Vasvi Seth

Cyber Security Stude...ย โ€ขย 11m

๐Ÿ’ป Embracing Cloud Security: Ensuring Data Protection in the Digital Realm ๐Ÿ”’ Cloud security is more than just a buzzword; it's a critical process ensuring that assets stored in the cloud are properly configured and access is restricted to authorize

See More
0 replies4 likes

Sahil Alam

Web and App develope...ย โ€ขย 4m

Build once, deploy everywhere โ€“ with a single app for mobile and web, offering top-tier security features like data encryption, secure authentication, and privacy protection ios and android......

0 replies2 likes
Image Description

Vasvi Seth

Cyber Security Stude...ย โ€ขย 11m

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 replies5 likes

Rehmat Ali

Founder of toolverse...ย โ€ขย 16d

Over 200 Million Records Allegedly Belonging to X Leaked Online According to the author of the post, in January 2025, 400 GB of data on 2.8+ billion Xโ€™s users was leaked. The author claims that they decided to post the data after seeing โ€œno sign tha

See More
0 replies4 likes

Download the medial app to read full posts, comements and news.