Internxt is a little different than your average cloud service.
Our secure storage was designed from the ground up with the user and their privacy in mind. To do this, we’ve built our service for Web3, which means the information we encrypt and store is decentralized and our business model has nothing to do with selling data.
Internxt is open-source and built on a blockchain so every bit of code we create is accessible for verification and every action on our platform is recorded to the blockchain register.
Confused? Computer technologies can be a bit complicated. Learn more about how Internxt works to create the safest and most secure cloud service possible below.
From A to X: Everything About How Internxt Works
An overview of what happens when you store your files or photos with Internxt:
First, you make an account, which on the surface is a pretty standard process.
The difference with our service is with each account the user creates they are issued a client. This client is like your master account. The password and account you make give you access to your client. In your client, we store your mnemonic which acts as your encryption key (more on that later).
Whenever you register an account with the Internxt platform we generate a passphrase and place it in your client. This passphrase is called a mnemonic.
We then use encryption to secure your mnemonic before sending it to Internxt systems. Your plain text password is used as a key to encrypt your mnemonic before it leaves your device. Any time you log in to your account thereafter, your password is used to decrypt the mnemonic which will then be used to derive each unique encryption/decryption key for each file.
Once you create an account and access the platform, the service operates like any other familiar private cloud storage. You can create folders, share docs, upload and download files.
Encrypting and decrypting your files
When you upload a file to our private cloud storage, Internxt automatically encrypts the file before it leaves your device. Nothing you upload reaches the internet in its raw, readable form.
When a file is encrypted the information is scrambled and rendered unreadable. After your file is encrypted, we then break it into shards and distribute the pieces of information throughout the Internxt network. Only the user with the encryption key can decrypt and piece back together encrypted files.
For end-to-end encryption, we use your mnemonic as an encryption key (the only one that has access to that mnemonic is you) and we also utilize an element called IV, which is a randomly generated number that adds entropy to the encryption algorithm. We do store the IV but this is not an element that can be used to decrypt your data.
To be more specific, we use an algorithm in our safe storage, known as AES256.
Your password is hashed with a randomly generated salt. Then, before we send the hash to Internxt systems for persistence, we also encrypt this hash. By using this method we ensure nobody outside your client can gain access to your password. You can be confident that your files are in a safe storage service. We also provide a free password checker tool that will tell you how strong your password is, ensuring that your account is not hacked or exposed to data breaches.
File sharing works a little differently on our service, rather than moving the file in a workable or raw form between users we instead encrypt the mnemonic of the file you would like to share (and store it encrypted) with a code that goes in the link.
We do not store the code with the mnemonic or the shared file, instead it gets attached to the link. Only those who have the link containing the code can correctly regenerate the decryption key and download the content without corrupting it.
Encrypted files are sent across a vast peer-to-peer network rather than a centralized data server farm. Internxt doesn’t operate a massive data center, unlike Amazon and Google. These large centers are a prime target for hackers since much of the data stored there is in its raw form.
Also, these data centers give Big Tech companies an enormous amount of control and power over your information. It’s almost impossible to know if the company your hosting information with has accessed your data.
As with blockchain companies, Internxt distributes your encrypted files across a peer-to-peer network, meaning your files are scattered across the world to various user devices or servers. Your encrypted files can’t be opened by the host (since they don’t have the encryption key).
By spreading information over many more devices and geographic locations. Internxt’s secure storage ensures the user is less likely to experience data loss due to hardware malfunctions, power disruptions, or natural disasters. Basically, all of the user's eggs are spread out across many baskets.
All of these transactions and movements of data are tracked and organized on the blockchain, a digital registry that records all transactions in perpetuity. Think of blockchain as an old-school financial ledger, it tracks every change allowing for virtually anyone to analyze it for discrepancies. If something goes wrong or information is altered or tampered with, it will be evident in the blockchain and corrected.
Blockchain technology allows for integrity, transparency, and democracy within Internxt systems. Blockchain backers ensure that the entire process is carried out correctly.
The blockchain is tamperproof. It is capable of being copied and verified by every network user. Blockchain. Also, it allows for mediation and verification of peer-to-peer without a centralized monitor, which means Internxt doesn’t make the rules.
Everything we have mentioned prior is all built on Internxt’s source code. Basically, the code is the language blockchain engineers, programmers and blockchain developers use to tell computer systems what to do and how to do it. Computers don't do anything without first being told or at the very least (in the case of AI) given a set of guidelines to follow.
Internxt is open-source, as well as most blockchain companies, which means anybody (who understands the coding language) can look under the hood and personally inspect the system we’ve built in our secure storage. All of our code is published here on Github, feel free to take a look!
Still have questions? Contact us directly via email at firstname.lastname@example.org. We will continually update this article with more information as we gather feedback from our users and readers. Let us know what you want to know!