This section describes the encryption mechanisms used on Storj and describes supported approaches to data and metadata encryption.

Separate and distinct from the topic of access management, a number of different levels and applications of strong encryption are applied throughout the Storj service. Within the encryption paradigm, there are design choices that impact the level of privacy and security of an application.

Key Point: Storj provides several approaches to developing more secure and private applications and your choice of integration pattern will allow you to make an informed decision on the right type of encryption to provide the commensurate level of privacy and security for your application data.

Auth Service