End-to-End Encryption Storage

1. Introduction

Infinite Disk makes Community Storage available at extremely low cost with very high reliability. Community

2. End to End Encrypted Storage

Community Storage cannot be trusted like Home Storage since equipment is NOT situated on premises exclusively controlled by the owner.

However Community Storage can still be useful for public data or when when the user data is end-to-end encrypted.

Much Better that Cloud but still not the Best

Although end-to-end encryption is MUCH MORE secure that the Cloud based file, email and messaging systems (e.g. Apple, Google etc.) you are using right now, putting your data on Community Storage is still less secure than having them on Home Storage.

For example, weakness in end-to-end encrypted emails in some situations.

End-to-End Encryption over Community Storage immediately improves the security of your data over your current processes and provides great introduction to End-to-End Encryption over Home Storage.

3. Bundled Applications

  • Storage Browser - no encryption
    For you to collect data from a wide range of non end-to-end encrypted sites so you can store them end-to-end encrypted yourself.

STORAGE BROWSER

1. Importing Data

Transferring your data from non end-to-end encrypted storage is easy with the Storage Browser that can connect to most storages near and far.

PERSONAL INFORMATION STORE

1. Personal Information

Current Cloud services (e.g. Apple Cloud, Google Cloud etc.) do NOT encrypt your most personal information (e.g. contacts, calendar, tasks, notes) end-to-end. That is their computers have access to your information at anytime whether it is under the authority of the government or not.

personal.infinitedisk.com gives your personal information (e.g. contacts, calendar, tasks, notes) the security it deserves - END TO END ENCRYPTION - which are performed offline locally within the browser ensuring that no one but you have access to the password or private key used.

2. etesync.com

Current Infinite Disk Personal Information Store is based on EteSync.

Etesync has this cool end-to-end encrypted platform called Etebase, which goes far beyond storing just personal information, which we are planning to develop with, so we can add end-to-end encrypted storage to the Infinite Disk Storage Browser as another data source for browsing.

Etesync used the same NaCl technology as us in Dynamic Alias (they use the libsodium library) so there is a good understanding of the way Etesync performs encryption.

LOCAL FILE ENCRYPTION

1. File Encryption

encrypt.infinitedisk.com enables manual file encryption to be performed offline locally within the browser ensuring that no one but you have access to the password or private key used.

2. Hat.sh

Current Infinite Disk manual file encryption is based on Hat.sh.

Hat.sh supports BOTH passwords or keys, but the use of password is discouraged.

2.1. Encryption

A file can be encrypted with either Password or Keys.

2.1.1. Encrypt with Shared Password

  1. Navigate to the Encryption panel.
  2. Drag & Drop or Select the files that you wish to encrypt.
  3. Enter a password or generate one.
  4. Download the encrypted file.

2.1.2. Encrypt with their Public Key and your Private Key

  1. Navigate to the Encryption panel.
  2. Drag & Drop or Select the files that you wish to encrypt.
  3. Choose public key method.
  4. Enter or load recipient's public key and your private key. if you don't have public and private keys you can generate a key pair.
  5. Download the encrypted file.
  6. Share your public key with the recipient so he will be able to decrypt the file.

2.2. Decryption

A file can be decrypted with either Password or Keys.

2.2.1. Decrypt with Shared Password

  1. Navigate to the Decryption panel.
  2. Drag & Drop or Select the files that you wish to decrypt.
  3. Enter the encryption password.
  4. Download the decrypted file.

2.2.2. Decrypt with their Public and your Private Key

  1. Navigate to the Decryption panel.
  2. Drag & Drop or Select the files that you wish to decrypt.
  3. Enter or load sender's public key and your private key.
  4. Download the decrypted file.

3. Technical Information

Hat.sh Release History

Hat.sh uses the same NaCl technology as us in Dynamic Alias (they use the libsodium library) so there is a good understanding of the way Hat.sh performs encryption.

  1. X25519 - for key exchange.
  2. XChaCha20-Poly1305 - for symmetric encryption.
  3. Argon2id - for password-based key derivation.