Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename conversion table is created to restore the concatenation order during a restore. The method aims to guarantee confidentiality, integrity, and availability of data, regardless of the trustworthiness of the chosen storage environment, while protecting against data breaches and unauthorized access. Threshold Key Sharing further enhances security and resilience by splitting the private key into parts requiring cooperation from multiple parties for reconstruction, thereby minimizing single points of failure.
Features
- The most secure way of protecting your Bitcoin seed phrases
- Backup
- Encryption of personal data at rest
- IPFS (InterPlanetary File System) ready
- Veilid ready
- Ideal as an extra privacy layer for IPFS or Veilid storage
- Integrated AES-256 bit encryption
- Integrated gzip compression
- Symmetric key cryptography
- Private key doesn't need to leave the building
- Collaborative Key Management
- Uses a combination of unique data obfuscation techniques
- Sliced archive in 100 to 1,000 chunks
- On-the-fly sha512 hash generation for each archive chunk
- Detection of file change during restore based on sha512 hash
- Cloud storage
- Cold storage
- Secure backup to cloud
- Privacy
- Integrity
- Security
- Cryptography
- Free
- Open Source
- Available for OpenBSD, macOS and GNU/Linux distributions
- Open source, changeable, and fully reviewable
- Client-side - no accounts - no data shared with any online service
- Protection in Untrusted Environments
- Secure Cloud Storage
- Encrypted Cloud Storage
- Protection of Critical Data
- Protection of Sensitive Data
- Protection of Confidential Data
- Critical Data
- Sensitive Data
- Confidential Data
- Archiving
- Threshold Key Sharing