top of page

Your Data Security, Our Priority.
 

We know your information is precious, and we treat it with the highest level of protection.
 

That’s why our storage partner works with trusted third-party experts who continuously test and certify their systems. This means your data stays protected and fully compliant with the latest security standards at all times.
 

  • Regular security and system checks keep everything running safely and reliably.
     

  • Independent SOC 2 audits prove that strict safeguards are in place to protect your data, ensure our service is always available, and maintain your privacy.
     

  • On top of that, their SOC 2 + HIPAA certification shows a deep commitment to security — meeting not just customer promises but also healthcare-level standards for data protection and breach notifications.
     

Your trust matters to us, and we’ve built our security practices to make sure your information is safe, private, and always handled with care.

​

​

Storing & Retrieving Your Data

Soc2-Type2.webp
storj  schematic from them copy.png

The above diagram shows what happens to your data when you upload it, how it is stored and how you retrieve it.

​

​

When you upload your data it is encrypted before it reaches MySORTED, so we cannot see it,  this is what a typical bank statement looks like once it is encrypted.

File encrpted between them and MySORTED copy.jpg

​

​Your data is encrypted again on its way to our decentralized storage partner, where it is cut into 80 pieces and each piece is saved randomly across 16,000 + computers world wide .

 

The Ultimate in Data Security - Wallet Connect Login & Decentralized Globally Distributed Storage Network.

​

Your Login and Data Storage Security are absolutely our first priority.

                                                                 

By offering you a Wallet Connect solution which is the first means of securing your data. with, with further security measures that can be enabled inside our MySORTED App. 

​

The MySORTED App has been developed so that you can securely store all of your personal and business information and files on a Decentralized Globally Distributed Cloud Network and retrieve it at the click of a button.

​

We take the security of your data as seriously as our own and have teamed up with the Worldwide Leader in Decentralized Globally Distributed Storage to provide the best possible solution.

​

Unlike other storage servers that are centralized, on MySORTED your data is encrypted, split into 80 shards / pieces, stored and retrieved through 16,000+ remote Nodes within this global network.

​

Centralized networks are more vulnerable to attacks as hackers only need to target one central point to gain access to the entire system. Decentralized globally distributed networks are more secure because even if one node is compromised, the others are not affected.

​

Other storage servers that are centralized store all your data on their servers – they have full access to your information. Their encryption isn't Zero- knowledge, there also isn’t a clean history that can prove it’s a secure cloud storage service.

​

By offering you a wallet connect solution is the first means of securing your data. The only person who has access to your SORTED™ account is you. To make sure you are the only one never under any circumstances share your secret passphrase.

​

Please see Basic Saferty & Security Tips for MetaMask Wallet Connect. https://support.metamask.io/hc/en-us/articles/360015489591-Basic-Safety-and-Security-Tips-for-MetaMask

​

  • Logging in via MetaMask using Wallet Connect or Socials or Email:

  • WalletConnect: Scan the QR code to connect your MetaMask wallet to a decentralized app or service.

  • Social Logins: Some platforms allow MetaMask to be combined with social logins for a seamless Web3 experience.

  • Email: Although email login is less common with MetaMask, some platforms combine wallet-based authentication with email registration for added convenience.

Encryption & Storage: 

​

Can we or our chosen storage partner see the data you store?

​

No! We use the best in encryption technology on a decentralized network which means we couldn't access your encrypted data even if we really wanted to. This is why data breaches and downtime are a thing of the past with SORTED™.

 

What kind of encryption is used?

Every file is double encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to the network which is why no unauthorized user can access your data.

Why is this important?

Only you should own your data. A file on MySORTED™ can't be accessed without keys or permissions. Everything is double encrypted before being split and stored.. 

​

Splitting Files:

How many pieces does a file of yours get split into?

Each file gets split into 80 shards / pieces.

​

Global Distribution:

Each piece is stored across 16,000+ different nodes globally, all with different operators, power supplies, networks, and geographies.

​

Why split up the files?

Splitting files into pieces means your data is never in one place, ensuring ultimate security and availability. If there's a massive power outage, or something causes several nodes to go offline, that's completely ok.

The network automatically repairs each piece and recreates it on a healthy node ensuring data is never lost. And because each piece is indistinguishable from any other file's pieces without the encryption key, this enables unparalleled security and privacy.

​

Is this secure?

This is a new standard in data security. You don’t have to trust us saying this, that’s just how it works. We’ve taken trust out of the equation entirely by using Reed-Solomon erasure coding. If someone else wants to access your data, they would need to locate each node, then identify your file piece from thousands of other file pieces and repeat that process 29 times. Next, they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.

​​​

How are nodes selected to store an object piece?

Nodes are automatically selected according to reputation and local latency. We select reputable nodes at random, weighted by network diversity, then attempt to upload to a larger set of those selected nodes. The fastest nodes from this set are chosen to store files.

​​

Data Retrieval:

​

How many pieces are needed to retrieve a file?

To retrieve a file, we only need 29 encrypted pieces. Using just those 29 pieces, the network can automatically rebuild the data contained in the remaining pieces.

​

What happens if a node goes offline?

One node going offline won't impact any files. Our network's automatic repair process reacts when too many pieces for any files are lost, and repairs them within a very healthy margin of safety.

bottom of page