Key Features:
Decentralized Storage
Storage nodes store only a piece of an encrypted file, ensuring data security at rest. No snooping by anyone!
End to End Encryption
No one except intended recipients can access files.
Non-Custodial Key Management
Users need not store or manage keys.
Decentralized IAM
Your users truly own and control sharing access to their data.