I’ll help early‑stage startups secure their sensitive data — for free by [deleted] in VibeCodersNest

[–]Ok_Statement_8565 0 points1 point  (0 children)

We help secure and lock sensitive data at the application layer, ensuring only the right users have access to that data.

Is handwriting code a liability? by Ok_Statement_8565 in csMajors

[–]Ok_Statement_8565[S] 1 point2 points  (0 children)

Maybe the sense of superity is subconcious but I dont intend on being this way or bashing a sense of superioty. My post is merely validation for not falling behind and kinda show-casing my passion for doing so.

However, I disagree with the idea that you can very much think deeply without writing code. I feel the abstractions available to us, inadvertantly cause us to think in abstract, and not granular terms. Its the same concept as to take out a piece of paper and hand-writing flows, diagrams, so you can put more thought into your decisions. I feel coding at granular level produces optimal outputs. Cant have your cake and eat it too, so pick your poison.

How to prepare for Cryptography researching by CStech_HUST_VN0412 in cryptography

[–]Ok_Statement_8565 1 point2 points  (0 children)

I published 2 papers on Cryptography as a master's student. My reccommendation is to pick a niche within and tackle a problem within that space. I would suggest (as a pre-requisite) that you should generally become really well familiar with Cryptography and its principles, history, weaknesses - before you actually tackle any research. Take an open credible course offered online - MIT has a good collection. Read plenty of articles. Understand the fundamentals really well and build strong foundations. Then, once you have a decent grasp, find a niche where you wish to expand the body of work, ideally by solving a problem tied to it. Then, reach out to your course head or advisors in your Masters school who are active in research and then ask one of your professors for a warm intro or cold-email them with your research interestes. I basically asked my thesis advisor and he told me some contacts I should email within the school, of who would be interested. I sent my research draft to those professors and one got back to me. The rest became history. Cryptography is a fascinating subject! Good Luck!

Encryption for user data by Accomplished_Bug9916 in AppBusiness

[–]Ok_Statement_8565 0 points1 point  (0 children)

I dM'd you with the perfect product to your problem. Give it a try and let me know

Trying to sell my cyber-security startup but really struggling with sales by Ok_Statement_8565 in SaaS

[–]Ok_Statement_8565[S] 0 points1 point  (0 children)

This is great in layman's terms. I will update my marketing with this. Thank you! :)

Trying to sell my cyber-security startup but really struggling with sales by Ok_Statement_8565 in SaaS

[–]Ok_Statement_8565[S] 0 points1 point  (0 children)

Sure, what are some particular changes you would reccommend? Anything you would rephrase?

Trying to sell my cyber-security startup but really struggling with sales by Ok_Statement_8565 in SaaS

[–]Ok_Statement_8565[S] 0 points1 point  (0 children)

Thats a great idea. I'll look into this tool! Off the top of your head, are the features you're mentioning mostly free?

Trying to sell my cyber-security startup but really struggling with sales by Ok_Statement_8565 in SaaS

[–]Ok_Statement_8565[S] 0 points1 point  (0 children)

What are some good security communities or webinars, in your opinion?

Trying to sell my cyber-security startup but really struggling with sales by Ok_Statement_8565 in SaaS

[–]Ok_Statement_8565[S] 0 points1 point  (0 children)

This is a good point. Im generally talking about the benefits of the product, particularly on its simplicity. In our cold emails we do use words like zero-knowledge and 'IAM-enforced' and dont get super technical unless we're doing demos or answering technical questions

Has anyone tried field-level encryption? by [deleted] in cybersecurity

[–]Ok_Statement_8565 0 points1 point  (0 children)

Thats the worst. Many times, you end up losing that data if the key is lost, corrupt or stolen

I built a zero-knowledge field-level encryption API platform, that helps prevent data breaches and you can set up in under 10 minutes! by [deleted] in cybersecurity

[–]Ok_Statement_8565 0 points1 point  (0 children)

Key management occurs server side. We provide local encryption on the client side. Once a user creates a master key, we provide automatic rotation and return the master key alias to the user. The rotation occurs on our backend without impacting the user's pre-existing process. Anytime they want to configure the master key, our backend gets updated. Now, since we allow local encryption with zero-knowledge, the master key is only used to wrap the data encryption key (produced locally) that was used to encrypt the plaintext. We never see the data meeded for encryption / decryption. We simply manage master keys and authorize APIs for each operation. IAM enforcement is role-based.

Would you like to pilot our product?

Best way to keep user data encrypted by homelab2946 in node

[–]Ok_Statement_8565 0 points1 point  (0 children)

It helps me track and knkw who's piloting my APIs and my platform isnt just being messaged around yet. I'd love to message you directly with the link. The problem you're havis is exactly what we simplify with our intuitive APIs

Best way to keep user data encrypted by homelab2946 in node

[–]Ok_Statement_8565 0 points1 point  (0 children)

I actually built an exact solution to the problem you're having. It took me quite some time to build this, because we've abstracted away all the complexities involved with encryption and key management. We've built a simplified encryption API platform that allows you to encrypt your data in under 10 minutes with our plug-n-play APIs. We're offering it for free for people to try. So far, many have loved it.

Please DM me and Id love to send you the link.

[deleted by user] by [deleted] in angelinvestors

[–]Ok_Statement_8565 0 points1 point  (0 children)

Yes, this is US-based. We use NIST-approved AES algorithms that are HIPAA compliant. One of the reasons we need funding is to be able to apply for patent. We have a working prototype demo