Our Services

Privacy, Sovereignty, Security
Peers only

The New Storage Standard

Out with the days of large and untrustworthy data centers. Welcome to the future: where your data is only secured by your friends, family, and peers. Secured by peers, only accessible by you.

Proof Of Concept

This Incomplete POC marks the beginning of our journey to data sovereignty. Created by founder Maxwell Koegler, this model relies on a legacy Geth version to generate a redundant p2p network. For those familiar with GETH visit the official GitHub repository

This POC features more than its fair share of problems. It’s incompleteness comes in the sense that it features no native encryption, storage, or retrieval features. Its merely the raw network, and should not under any circumstance be used to communicate or store valuable/sensitive information. Find more technical details in the installation folder or here.

FAQ

Our incomplete POC is available for download above (Currently only Windows). Unfortunately, all further prototype development is on hold until funding rounds conclude. Looking forward, we’re continuing to form our theoretical network structure as to provide the utmost security, redundancy, and  usability.

Despite not having a complete product, our team has devoted countless hours to answering these exact questions. Depending on network, rigidity malicious actors (eg. greedy network participants) will be removed from the network automatically if they refuse to comply with network guidelines. As for nefarious networks, its planned for a certain number of random participants to added to each network, and a “rat reward” issued to all users to report any illegal or nefarious network activity. Learn more on our Technical Docs.

Sem-Prem is a revolutionary data storage model that features only the best of both cloud storage and On-Prem storage methods. By leveraging storage on other trusted computers in a P2P network, and the most aggressive encryption algorithms on the market, you can trade excess space on your computer for redundancy. However, unlike cloud storage, your data can only be viewed by you, not your network peers or even us. Learn more on our Technical Docs.

Technically speaking Data Sovereignty regards to political actors and their internet jurisdiction, but in this case data sovereignty regards a user’s ability to control their own data. For a rather simple example, cloud storage entities can view much if not all out your stored data and demographics. Additionally, in rare cases, cloud storage users are put at risk for censorship. Although not seen every hour, it’s still important for us to reduce these risks to a minimum, for both priceless memories, and priceless enterprise reliability. Learn more on our Technical Docs.