Storro’s decentralized approach to key management is unique and in sharp contrast to many of the currently available cloud applications and cloud services offered for (online) collaboration. In those cases, encryption keys are in the hands of the file owner(s), as well as an external party: the cloud provider. As a result this third party is able to go through your “encrypted” data.
Furthermore the keys at third party providers are stored centralized on their premises making it a very interesting target for hackers and malicious actors: a single hack could give a hacker access to countless documents and files.
For a further in-depth example of how Storro’s decentralized key management is used in the application, please read this article on ‘Flexible Decentralized Access using Invitation-Response Dialogue’ by our CTO.