Security
Learn about data security for objects stored on Filebase.
All data stored on Filebase have an innately high level of data security. Objects are stored across decentralized networks. Currently, we support the IPFS and Sia networks. For more information on these networks, please see here.
Decentralized networks are composed of different peer-to-peer networks. These networks are composed of storage nodes, located all over the globe.
Some decentralized networks use Erasure coding, also known as Reed-Solomon coding, is a data storage algorithm that allows objects to be stored in parts instead of their entirety. Each object stored within decentralized storage networks gets broken into tens or hundreds of pieces, also called shards. Each shard gets encrypted both during data transmission and when the data is at rest.
While the data may be distributed across multiple nodes, only a fragment of it is needed to reassemble it. Each bit of data that is stored on a node is worthless by itself. This ensures that data is reliable, even if any individual node is damaged or destroyed.
To access the object, you will need to provide a personal encryption key or hash to the storage network. The network then retrieves the pieces of the file that are stored on different nodes, reassembles them into a single object, and sends them to the user. This object is only available to the person who has the encryption key.
If you have any questions, please join our Discord server, or send us an email at [email protected]
Last modified 1yr ago