Your files, not ours. We take the security of your data as our utmost priority and give detail below on the implemented measures to ensure that your data is safe and secure, and remains only yours.
End-to-end SSL encryption is used throughout the application. This ensures that all data transmitted between your browser and our application is secure and encrypted. File asset contents are never transmitted to a Peerdweb server.
Peerdweb uses the Polygon blockchain to store the hash of the file. This ensures that the file's existence is registered on a public, decentralized ledger. The file itself is never stored on the blockchain.
Peerdweb uses industry-standard authentication mechanisms to ensure that only authorized users can access the application. This includes the use of secure passwords and multi-factor authentication.
Peerdweb ensures that each tenant's data is isolated from other tenants. This ensures that your data is secure and protected from unauthorized access.
In order to register an assets existence, Peerdweb calculates the hash of the file. This hash is used to verify the file's integrity and authenticity, and it is this hash that is stored on the blockchain. The file itself is never stored on a Peerdweb server nor on the blockchain.
We use crypto libraries within modern browsers to calculate the industry-standard SHA-256 hash of the file. This ensures that the file is never transmitted to a Peerdweb server. No proprietary technique is used, ensuring the same SHA-256 hash is calculated by any other party.
Enterprise subscribers using our service can choose to store file assets in a secure, private cloud environment. Communication to and from the Enterprise's cloud environment does not pass through Peerdweb servers.
All data stored in the Enterprise's cloud environment is encrypted at rest. This ensures that the data is secure and protected from unauthorized access.
Peerdweb undergoes regular security audits to ensure that the application is secure and protected from vulnerabilities. This includes regular penetration testing and code reviews.