Data Privacy & Security
Your privacy settings and encryption options
End-to-End Encryption
All files are encrypted before leaving your device. Only you have access to your encryption keys.
Enabled
Private Keys
Your private keys are stored locally and never transmitted to the network. You maintain full control.
Zero-Knowledge Architecture
Storage providers cannot access your data. The network operates with zero knowledge of file contents.
Active
Data Integrity Verification
Cryptographic proofs ensure your files remain intact and unmodified on the network.
Censorship Resistance
Your data is distributed across multiple nodes, making it resistant to censorship and single points of failure.
Protected