File
Because the security of your data must be intrinsic.
Corporate security policies
Create access controls and set policies with just a few clicks.
End-to-end encrypted
Storro provides zero-knowledge encryption. All private keys are generated locally, stored only locally, and are owned solely by the file owner(s). No one else has access to the keys or the files, not even Storro BV.
Zero-knowledge encryption means that no one (not even your IT service providers) can access your secured data except you. To do this, all files must be encrypted immediately ‘at the source’: on the user’s device. This level of security is in sharp contrast to many of the currently available cloud applications and cloud services offered for (online) collaboration. In those cases, the cryptographic keys are in the hands of the file owner(s) and a third party: the service provider. As a result, this third party has access to your “encrypted” files.
In addition, with third-party providers, the keys are centrally stored at their location, making it a very interesting target for hackers and malicious actors: with a single hack, a hacker can gain access to countless documents and files.
Encryption
The digital security of your files is our highest priority. That is why Storro uses proven and very robust encryption algorithms.
Our cryptography is used on three levels:
The basic cryptographic algorithms that Storro uses are:
These algorithms have no known weaknesses. They have relatively simple specifications with no unexplained constants. The algorithms all work in constant time and have fixed memory access patterns. This makes them immune to side-channel attacks, for example, a vulnerability of regular AES implementations.
Logging and revision management
Storro has a blockchain-based audit trail of every collaboration environment. Every change to a file, inviting a new member, creating a new subfolder, and all other actions in a collaboration environment are thus unequivocally recorded.
Moreover, thanks to Storro’s built-in revision management, you can easily revert to any previous version of files based on this crypto chain. There is no limit to how far you can go back in history.
Never worry about the security of your files again