Back

Saranyo Deyasi

I am the exploit • 3d

My next goal: to specialize in cryptography and cyber defense systems. I’m currently building my base in Python-based encryption and decryption algorithms, aiming to design secure digital systems for real-world use. #CyberGoals #FutureDefender #TechJourney

Reply

More like this

Recommendations from Medial

Masoom Ul Haque Choudhury

Radioactive • 7m

Hello! I’m new here and working on cutting-edge projects that tackle some of the toughest challenges in computer science, spanning AI, encryption, satellite algorithms, and advanced communication systems. These innovations have the potential to tran

See More
Reply
3

Devak K

Hey I am on Medial • 2m

Secure Your Business in the Cloud – The Smart Way At DigitDefence, we specialize in providing trusted cloud security solutions tailored for small and mid-sized businesses. Whether it's sensitive data, client information, or operational systems – w

See More
Reply

Siddu The Great

Siddu • 4m

I am fresher at IITM pursuing Engineering Physics Btech and IITM BS in Data Science Initially I was planning to join the forces through NDA but seems the gods have something else in store for me. I am planning to start a Defense company which will

See More
Reply
5

William Freede

Hey I am on Medial • 1m

Bitcoin Flash Software is a trading platform designed to analyze cryptocurrency markets and execute trades automatically. It uses advanced algorithms to identify profitable opportunities, aiming to maximize returns for users. The software claims to o

See More
Reply
1

Sheikh Ayan

Founder of VistaSec:... • 2m

📖 What is White Box Penetration Testing? White Box Penetration Testing (also called Clear Box, Glass Box, or Transparent Box Testing) is a security testing approach where the tester is given full knowledge of the target system before the assessment

See More
Reply
1

Vasvi Seth

Cyber Security Stude... • 1y

🔒 Elevate Your Cybersecurity Defense with Honey Pots! 🔒 In the fast-paced world of cybersecurity, staying one step ahead of threats is non-negotiable. Introducing Honey Pots – your secret weapon in the fight against cyber adversaries! 🛡️💻 What

See More
Reply
5
Image Description
Image Description

Elite Nexus

INFO INFO EVERYWHERE • 8m

Empowering Individuals in the Age of Technology As technology advances at an unprecedented pace, staying informed is not just an advantage—it is essential. Emerging fields such as artificial intelligence, quantum computing, and blockchain are reshap

See More
8 Replies
1
20

Tanzeem Mallick

Expanding Possibilit... • 7m

Creating Problem for New Age Intelligent For centuries, humanity has dreamed of true intelligence, something beyond basic automation and machine learning tricks. Yet, in 2025, we are still stuck with AI that spits out text, hallucinates data, and fai

See More
Reply
3

AIGuts

Exploring AI's poten... • 5m

What Are the Best Data Security Platforms to Protect Your Business in 2025? In today’s digital landscape, protecting sensitive information is no longer optional—it’s essential. As cyber threats grow more complex, choosing the right tools can make or

See More
Reply
8

Nawal

Entrepreneur | Build... • 5m

The World Isn’t Run by Countries Anymore. It’s Run by Flows 🔥 We grow up believing countries are the primary actors on the global stage. Maps show boundaries. Textbooks show wars. News shows summits. But once you look beneath the surface You re

See More
Reply
1
6

Download the medial app to read full posts, comements and news.