The Storj Labs Blog

We care deeply about security and privacy, so it’s no surprise that the official Storj “uplink” client has always supported end-to-end encryption (E2E). Before we delve deeper into the details, let’s define end-to-end encryption: Most end-to-end encryption descriptions say it’s a system of communication where only the communicating users can read the messages. Messages or data are protected from potential eavesdroppers, including telecom providers, internet providers, and even the provider of the communication service.
Read More →

When Amazon launched its S3 service 15 years ago and created the cloud storage industry, it also unknowingly made object storage the standard for storing data in the cloud. Object storage organizes data into objects, which contain the data itself, its metadata, and a unique identifier. These objects are stored in buckets rather than a hierarchical system. Since then, the grand majority of cloud storage services have reinforced this interface, and the majority of people storing data in the cloud use similar architectures.
Read More →