Zero-knowledge Encryption
   HOME
*





Zero-knowledge Encryption
In cloud computing, the term zero-knowledge (or occasionally no-knowledge or zero access) refers to an online service that stores, transfers or manipulates data in a way that maintains a high level of confidentiality, where the data is only accessible to the data's owner (the client), and not to the service provider. This is achieved by encrypting the raw data at the client's side or end-to-end (in case there is more than one client), without disclosing the password to the service provider. This means that neither the service provider, nor any third party that might intercept the data, can decrypt and access the data without prior permission, allowing the client a higher degree of privacy than would otherwise be possible. In addition, zero-knowledge services often strive to hold as little metadata as possible, holding only that data that is functionally needed by the service. The term "zero-knowledge" was popularized by backup service SpiderOak, which later switched to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cloud Computing
Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. Cloud computing relies on sharing of resources to achieve coherence and typically uses a "pay as you go" model, which can help in reducing capital expenses but may also lead to unexpected operating expenses for users. Value proposition Advocates of public and hybrid clouds claim that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand, providing burst computing capability: high computing p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SpiderOak
SpiderOak is a US-based collaboration tool, online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server, offered by a company of the same name. Its first offering, its online backup service later branded "SpiderOak ONE", launched in December 2007. SpiderOak is accessible through an app for Windows, Mac and Linux computer platforms, and Android, N900 Maemo and iOS mobile platforms. According to SpiderOak, the software uses encrypted cloud storage and client-side encryption key creation, so SpiderOak employees cannot access users' information. SpiderOak differentiates itself from its competition by this kind of encryption, in provision for syncing files and folders across multiple devices, and in automatic de-duplication of data. Some components of SpiderOak are open-source; in 2009, the company announced its intent for the SpiderOak One client's code to be fully open-source in the future. , the SpiderOak One client' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit. Methods Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Authentication can be considered to be of three types: The first type of au ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cloud Storage
Cloud storage is a model of computer data storage in which the digital data is stored in logical pools, said to be on "the cloud". The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment secured, protected, and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a colocated cloud computing service, a web service application programming interface (API) or by applications that use the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems. History Cloud computing is believed to have been invented by Joseph Carl Robnett Licklider in the 1960s with his work on ARPANET to connect ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Tresorit
Tresorit is a cloud storage service with end-to-end encryption. Founded in 2011, Tresorit closed an €11.5M Series B financing round in 2018 and was featured on FT1000 by Financial Times 2020 as the fifth fastest-growing cybersecurity company in Europe. The software is available for Windows, macOS, Android, iOS, and Linux, and the company has released plugins for Gmail and Outlook. As of 2022, Swiss Post owns a majority stake in the cloud storage service. Tresorit works as an independent entity under Swiss Post. The company has offices in Zurich, Switzerland; Munich, Germany; and Budapest, Hungary, employing around 100 people. History Tresorit was founded in 2011 by Istvan Lam (CEO), Szilveszter Szebeni (CIO) and Gyorgy Szilagyi (CPO). In the coming years, Andrea Skaliczki joined as CFO, Istvan Hartung as CTO and Arno van Züren as CSO. The company officially launched its client-side encrypted cloud storage service after emerging from its stealth beta version in April 2014. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Skiff (email Service)
Skiff is an email service startup company and collaboration tool, that provides privacy-friendly end-to-end encrypted ''Email'' and ''Cloud services''. The company's commercial strategy is focused in offering to its clients a Source-Available or Open-Source, transparent and audited ''Email, Calendar'', and ''Cloud Storage'' services without trackers or advertisements. Skiff launched in 2021 and was developed in San Francisco, California. In November 2023, 17 months after launch, it reached almost 2 million users. Skiff was acquired by Notion on 9 February 2024. Users will have six months to migrate their data before the closure of the services. History Skiff was founded by Andrew Milich and Jason Ginsberg in 2020 and was initially focused on providing a secure document editing service similar to Google Docs. While Skiff was in beta, the founders released a public whitepaper explaining how Skiff’s encryption works. Skiff had its public launch out of beta in November 202 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Tarsnap
Tarsnap is a secure online backup service for UNIX-like operating systems, including BSD, Linux, and OS X. It was created in 2008 by Colin Percival. Tarsnap encrypts data, and then stores it on Amazon S3. Service The service is designed for efficiency, only uploading and storing data that has directly changed since the last backup. Its security keys are known only to the user. It was developed and debugged, with input solicited from bug bounty hunters, to try to find vulnerabilities. A serious nonce-reuse vulnerability was found by this process and fixed in 2011. The document of the presentation "From bsdtar to tarsnap" by Percival from EuroBSD-Con 2013 contains "all kinds of detail on exactly how the algorithms work, how deduplication is managed ... the innards of how Tarsnap works" See also * Comparison of online backup services This is a comparison of online backup services. Online backup is a special kind of online storage service; however, various products that are ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Signal (software)
Signal is a cross-platform centralized encrypted instant messaging service developed by the non-profit Signal Foundation and its subsidiary, the Signal Messenger LLC. Users can send one-to-one and group messages, which can include files, voice notes, images and videos. It can also be used to make one-to-one and group voice and video calls. The Android version also optionally functions as an SMS app, but this functionality will be removed in 2023. Signal uses standard cellular telephone numbers as identifiers and secures all communications to other Signal users with end-to-end encryption. The client software includes mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel. Signal's software is free and open-source. Its mobile clients are published under the GPL-3.0-only license, while the desktop client and server are published under the AGPL-3.0-only license. The official Android app generally uses the propr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NordPass
NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari. History NordPass was developed by the same cybersecurity team that created NordVPN, a VPN service provider. Security features * NordPass is built with the ChaCha20 encryption algorithm specifically the XChaCha variant. * NordPass has zero-knowledge architecture, meaning that passwords are encrypted on the user's device and only then stored in the cloud. This way, NordPass cannot view, edit, or in any other way manage users’ password ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NordLocker
NordLocker is a file encryption software integrated with end-to-end encrypted cloud storage. It is available on Windows and macOS. NordLocker is developed by Nord Security, a company behind the NordVPN virtual private network, and is based in the UK and the Netherlands. NordLocker uses a freemium business model, where users are offered a free account with unlimited local file encryption and a set amount of cloud storage with sync and backup features. More cloud storage is available via a paid subscription. History In May 2019, NordVPN announced the upcoming launch of NordLocker, “an app with a zero-knowledge encryption process”. Although the initial estimated time of arrival was summer 2019, the actual launch took place in November. The app was launched as a local file encryption tool with secure sharing. Users were able to encrypt up to 5 GB of data for free or pay for unlimited encryption. In March 2020, NordLocker announced newly implemented cloud sharing integratio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

CNet
''CNET'' (short for "Computer Network") is an American media website that publishes reviews, news, articles, blogs, podcasts, and videos on technology and consumer electronics globally. ''CNET'' originally produced content for radio and television in addition to its website and now uses new media distribution methods through its Internet television network, CNET Video, and its podcast and blog networks. Founded in 1994 by Halsey Minor and Shelby Bonnie, it was the flagship brand of CNET Networks and became a brand of CBS Interactive through that unit's acquisition of CNET Networks in 2008. It has been owned by Red Ventures since October 30, 2020. Other than English, ''CNETs region- and language-specific editions include Chinese, French, German, Japanese, Korean, and Spanish. History Origins After leaving PepsiCo, Halsey Minor and Shelby Bonnie launched ''CNET'' in 1994, after website Yahoo! was launched. With help from Fox Network co-founder Kevin Wendle and forme ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]