Filebase
Search…
Security
Learn about data security for objects stored on Filebase.

Security

All data stored on Filebase have an innately high level of data security. Objects are stored across decentralized networks. Currently, we support the Storj, Sia, and Skynet networks. For more information on these networks, please see here.
Decentralized networks are composed of different peer-to-peer networks. These networks are composed of storage nodes, located all over the globe. Decentralized storage networks utilize erasure coding.
Erasure coding, also known as Reed-Solomon coding, is a data storage algorithm that allows objects to be soared in parts instead of its entirety. Each object stored within decentralized storage networks gets broken into tens or hundreds of pieces, also called shards. Each shard gets encrypted both during data transmission and when the data is at rest.
While the data may be distributed across multiple nodes, only a fragment of it is needed to reassemble it. Each bit of data that is stored on a node is worthless by itself. This ensures that data is reliable, even if any individual node is damaged or destroyed.
To access the object, you will need to provide a personal encryption key or hash to the storage network. The network then retrieves the pieces of the file that are stored on different nodes, reassembles them into a single object, and sends it to the user. This object is only available to the person who has the encryption key.
If you have any questions, please send us an email at [email protected].
Last modified 1mo ago
Copy link