Skip to main content
All CollectionsContribute
Is my computer safe when I contribute storage to Hivenet?
Is my computer safe when I contribute storage to Hivenet?

Contributing storage to Hivenet is secure. Your computer and files are safe due to our encryption, file chunking, and distributed storage.

Thanasis Karavasilis avatar
Written by Thanasis Karavasilis
Updated over a month ago

When you contribute storage to Hivenet, you become part of an innovative, secure peer-to-peer cloud storage network. We understand that the safety of your computer and files is a top priority, and we've designed our system with this in mind. Let's explore how Hivenet ensures your security.

The simple puzzle analogy

Imagine Hivenet as a complex jigsaw puzzle. When someone uploads a file to the distributed cloud, it's like breaking this puzzle into tiny pieces.

Each piece is then wrapped in a unique, secure envelope (encryption) and scrambled (compression), making it impossible to guess what part of the picture it is. These secured, scrambled pieces are then distributed to various people's toy boxes (computers). Everyone holds just one small, encrypted, and mixed-up piece, so they can't see or understand the part of the picture on their piece, much less the entire image.

Even if a piece originated from a problematic picture (like a virus), it's rendered harmless in isolation because it's just one small, scrambled, and locked piece. This way, your toys (files) and toy box (computer) stay safe, as no one can access or reconstruct the whole picture without having all the pieces and the unique keys to unlock each envelope.

Encryption and protection

All data is encrypted on the client side with robust end-to-end encryption. This means your files are securely encrypted before they even leave your device to join the Hivenet. We physically cannot scan your files, as you have the sole access to your encryption key, ensuring your privacy and the integrity of your data.

How we handle files, simplified

To enhance security, files uploaded to Hivenet undergo two key processes:

  1. Chunking: Files are split into small, unrecognizable parts, or 'chunks'.

  2. Compression: These chunks are then compressed, reducing their size significantly.

These processes render any potentially malicious content ineffective. For instance, a virus, when chunked and compressed, becomes 'stale' and incapable of reconstruction or activation on your or any other user's device.

Distributed storage for enhanced safety

The chunks are distributed across a dynamic network of Hivenet members. This dispersion ensures no single device stores a complete, reconstructible file, further safeguarding your contributed storage.

Did this answer your question?