Security & Privacy Model
Threat Modeling and Mitigations
Node Misbehavior
Mitigation: ZK proofs verify correct storage behavior.
Sybil Attacks
Mitigation: Non-financial identity proofs, decentralized identity (DID) attestations, and hardware-based uniqueness checks.
Data Leakage
Mitigation: End-to-end encryption and zero-knowledge metadata policies.
Censorship Attempts
Mitigation: Decentralized replication and multi-region redundancy.
Man-in-the-Middle Attacks
Mitigation: Mutual authentication and encrypted transmission protocols.
Sybil Resistance Mechanisms (Non-Financial)
Storax uses:
Decentralized identifier systems (DIDs)
Hardware fingerprinting
Reputation derived from verifiable behavior
Rotating cryptographic challenge-response systems
End-to-End Encryption Philosophy
Storax ensures that:
Users encrypt their own data before uploading
Nodes never hold decryption keys
All reconstruction relies on client-side key ownership
No third party can access plaintext data at any time
Last updated