Most modern software applications are based on a client-server architecture. In this case, users are connected to a central point, the server. Inherently everybody puts their trust in this server. When the server is unavailable for any reason, the whole system is unavailable. When the server gets hacked and therefore insecure, the whole system is insecure. For scalability reasons and to guarantee up-times, the cloud is often turned to. This means the application and data are hosted on third party servers, at mostly unknown locations. And everybody has to put their trust in these third party servers.
Storro functions revolutionary different, using a.i. peer-to-peer and Blockchain technology. Through Storro, team members can collaborate without using the cloud or another central component. This is made possible through a combination of encryption, compartmentalization and decentralization. What does this mean?Read more
The digital security of your files is our highest priority. That is why Storro uses the highest standards of encryption protocols. Furthermore, we strive for the easiest implementation of these protocols to reduces possible weaknesses.
Our encryption is threefold:
All keys are generated locally and remain exclusively on the local device. No one else gets these keys, including the Storro company.
Storro is one of a kind because its means to collaborate and file sharing are supported without the cloud. Your data is never stored on an unknown system of some third party. This is made possible through the use of peer-to-peer technology.
In a peer-to-peer (p2p) network computers (and other devices) communicate directly with each other. There is no difference between any two nodes in a network, unlike a client-server model in which a server does differ from a client. In a p2p model all connections in the network are on equal footing. As no single component is essential for correct and safe service within the system, the p2p network has no single point of failure. There simply is no single component that needs to be available constantly or trusted completely in order to guarantee correct functioning of the network. This makes a peer-to-peer network very robust and resilient against, for instance, DDoS attacks.Read more
Storro is currently supported by the following operating systems:
Should you have any questions about the technology behind Storro, please send us an e-mail at:email@example.com.