Decentralization is complicated stuff, we make it simple while offering a new standard in security, performance, and pricing.
First, objects are automatically encrypted using AES-256-GCM encryption.
Encrypted data is then split into pieces that can't be distinguished from any other object’s pieces.
Next, pieces are individually distributed to uncorrelated nodes around the world.
Finally, only 29 of an object’s pieces are needed to reconstitute that data for download.
Storj automatically encrypts all files before being uploaded--your data is only in your hands and those you share it with.
We use the best in encryption technology on a decentralized network which means we couldn't access your encrypted data even if we really wanted to. This is why data breaches and downtime are a thing of the past with Storj.
Every file is encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to the network which is why no unauthorized user can access your data.
Only you should own your data. A file on Storj can't be accessed without keys or permissions. Everything is encrypted before being uploaded—your data can only be viewed by those who have been granted access.
Yes. You have complete control over yourdata and can give and take away permission at any time
After being encrypted, each object is split into pieces that are indistinguishable from any other object’s pieces—this also gives your data constant availability.
Each file gets split into 80 pieces, and retrieving a file only requires 29 of those pieces. Each of piece is stored on a different Node, all with different operators, power supplies, networks, and geographies.
Splitting files into pieces means your data is never in one place, ensuring ultimate security and availability. If there's a massive power outage, or something causes several nodes to go offline, that's completely ok. The Storj network automatically repairs each piece and recreates it on a healthy node ensuring data is never lost. And because each piece is indistinguishable from any other file's pieces without the encryption key, this enables unparalleled security and privacy.
This is a new standard in data security. You don’t have to trust us, that’s just how it works. We’ve taken trust out of the equation entirely by using Reed-Solomon erasure coding. If someone else wants to access your data, they would need to locate each node, then identify your files piece from thousands of other file pieces and repeat that process 29 times. Next, they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.
Each piece of an object is distributed over a massive global network of nodes so data is never in just one place—it's all over the world with better security and privacy.
Our global network is made up of thousands of Nodes. Currently, over 16k Nodes arebeing hosted in 80+ countries.
When you retrieve an object, only 29 of its 80 pieces are needed to reconstitute that object. With no central point of failure, your data is always quickly available, all over the world.
Discover how to practically apply the unique edge-based security and privacy benefits of decentralization to solve real-world problems.
Take a deep dive into the multi-layered encryption and access management capabilities of Storj DCS that deliver a new standard in data security.
If your data isn't there when you need it most, you're out of business. Learn how Storj DCS can ensure on-demand availability of your data.
Get S3-compatible object storage with better security, performance and cost.
Start for free