Data Storage

How KRATE data storage works.

The Problem

Current storage solutions consistently fail to deliver data security, either through a human or technical failure, despite promises to be good custodians.

Alternative Text
  1. High Value Targets

    Central data silos provide high value targets for hackers much like banks provide high value targets for bank robbers.

  2. Lack of Encryption

    Only 4% of all stolen data was encrypted due to data privacy protection relying heavily on access controls as the only line of defense.

  3. Human Error

    Training and implementation errors of privacy protection systems leads to human error, creating environments with avoidable security risks.

Our Solution

A new a cloud that is decentralized, distributed, and peer-to-peer, providing self-sovereign data storage to individuals and organizations that follows these principles:

Alternative Text
  1. Least privilege

    Access is limited to users that have a legitimate purpose and/or operate in an appropriate role.

  2. Need-to-know

    Information will only be available if required to perform a specific task even if the person or device has access.

  3. Privacy by design

    Design and implementation are privacy driven.

  4. Encryption Always

    Regardless of the task, data is encrypted at every step and at rest. Data is only decrypted on devices authorized by the data owner.

  5. Full auditing

    Alert data owners of possible misuse, misrepresentation and/or misappropriation of information.

Data Storage Highlights

Zero-Knowledge Storage

A combination of erasure coding and checksums allows the KRATE Cloud to repair corrupted or missing user data with zero knowledge of what the data is. Data owners do not need self-monitor data to maintain integrity.

Privacy Standards
on Demand

Achieving and maintaining compliance with PIPEDA in Canada, HIPAA in the US, or GDPR in Europe, is made easier with the ability to enable or disable integrated privacy standards on demand.

Geo Fencing

Storage contracts allow for the user to specify regions where data can be stored for unique compliance requirements like the UKUSA Intelligence Agreement which specifies data is stored in the Five Eyes member countries.