4/4/2023 0 Comments Spideroak one backup![]() And a good rule of thumb is that any company that can reset your password could potentially access or read your data because they have the key to unlock it.įor our secure group chat, file sharing and collaboration tool Semaphor, it means you can even review the source code. Your data is completely safe from our sysadmins, your own sysadmins, hackers, a blind warrantless subpoena, or any threat.įor our backup product, SpiderOak ONE, this means we can never reset your password. Only you have the key on your device to decrypt them. Your files are encrypted before they leave your device and in-transit. ![]() Because of the way we build our products with end-to-end encryption, we have No Knowledge of the names or content of your files.Įven if we wanted to, we can’t see what you are storing or sharing, nor the conversations you’re having. No Knowledge means we give you complete privacy of your data - what we’ve been doing from the start. So, the point was well taken! Dear respected cryptographer friends, whom we admire and appreciate - we listened to your feedback.Īs we launch a new website today, we changed every mention of Zero Knowledge to No Knowledge. According to Wikipedia, it’s described as “a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is indeed true.” Our commercial use was inconsistent with the academic definition. The term ‘ zero knowledge proof’ or protocol is an academic term in cryptography. We even had a conversation about it on Hacker News. In recent years, other encryption projects have also adopted the term zero knowledge in their marketing.īut renowned cryptographers have pointed out to us that even though we use this term in our messaging, and we know it’s not technically accurate, it can be misleading to the experts, journalists or academics who know otherwise. It resonated with everyday users who loved the fact that they had complete privacy and control of their data. ![]() ![]() When we launched our backup software in 2007, we adopted the term Zero Knowledge to describe our end-to-end encrypted architecture. WHEN EXPERTS IN YOUR FIELD CALL YOU OUT, YOU LISTEN. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |