Decentralization Delivers Better Security & Privacy.

How it works.

Step 1

Objects are encrypted.

Storj DCS (Decentralized Cloud Storage) automatically encrypts all files before being uploaded--your data is only in your hands and those you share it with.

Can Storj see the data I store?

No. Files are encrypted, split into pieces, and stored on geographically diverse Nodes, making data breaches a thing of the past.

What kind of encryption is used?

Every file is encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to our network to ensure no unauthorized user can access it.

Why is this important?

Only you should own your data. A file on Storj DCS can't be accessed without keys or permissions. Everything is encrypted before being uploaded—your data can only be viewed by those who are granted access.

Can I revoke access privileges?

Yes. You have complete control over your data and can give and take away permission at any time.

Step 2

Encrypted objects are split into smaller pieces.

After being encrypted, each object is split into pieces that are indistinguishable from any other object’s pieces—this also gives your data constant availability.

How many pieces do files get split into?

Each file gets split into 80 pieces, and retrieving a file only requires 29. Each of the 80 pieces is stored on a different Node, all with different operators, power supplies, networks, and geographies.

Why split up the files?

Splitting files yields unparalleled performance and durability. Our decentralized architecture offers improved out-of-the-box security and privacy for our customers and enables more reliable performance than traditional cloud storage providers.

Is Storj DCS secure?

We like to think of it as a completely new standard for data security. You don’t have to trust us, that’s just how it works. It’s what we call trustless—we’ve taken trust out of the equation entirely. We couldn't read your data even if we wanted to. If someone else wants to access your data, they would need to first constitute your file from the network—already a tricky and complex task without strict authorization from our system—then they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.

Step 3

Object pieces are globally distributed.

Pieces of an object are then individually stored over a global network of Storage Nodes. An object is never in one place, outages, downtime, and data breaches are a thing of the past.

Where are the Nodes?

Our global network is made up of thousands of Nodes. Currently, over 10k Nodes are being hosted in 84 countries.

How many Nodes are files stored on?

80. We split each file into 80 different encrypted pieces, and each piece is stored on a different Node.

How are Nodes selected to store an object piece?

Nodes are chosen by reputation and local latency. We select reputable Nodes at random, weighted by network diversity, then attempt to upload to a larger set of those selected Nodes. The fastest Nodes from this set are chosen to store files.

Step 4

Objects are retrieved when you need them.

When you retrieve an object, only 29 of its 80 pieces are needed to reconstitute that object. With no central point of failure, your data is always quickly available, all over the world.

How many pieces are needed to retrieve a file?

To retrieve a file, we only need 29 encrypted pieces.

What happens if a Node goes offline?

One Node going offline won't impact any files. Our network's automatic repair process reacts when too many pieces for any files are lost, and repairs them within a very healthy margin of safety.

Build on the
decentralized cloud.

Kickstart your next project and grow your revenue with this high-converting, beautifully crafted template.
Start for free