Security & Privacy Model

Threat Modeling and Mitigations

  1. Node Misbehavior

    • Mitigation: ZK proofs verify correct storage behavior.

  2. Sybil Attacks

    • Mitigation: Non-financial identity proofs, decentralized identity (DID) attestations, and hardware-based uniqueness checks.

  3. Data Leakage

    • Mitigation: End-to-end encryption and zero-knowledge metadata policies.

  4. Censorship Attempts

    • Mitigation: Decentralized replication and multi-region redundancy.

  5. Man-in-the-Middle Attacks

    • Mitigation: Mutual authentication and encrypted transmission protocols.

Sybil Resistance Mechanisms (Non-Financial)

Storax uses:

  • Decentralized identifier systems (DIDs)

  • Hardware fingerprinting

  • Reputation derived from verifiable behavior

  • Rotating cryptographic challenge-response systems

End-to-End Encryption Philosophy

Storax ensures that:

  • Users encrypt their own data before uploading

  • Nodes never hold decryption keys

  • All reconstruction relies on client-side key ownership

  • No third party can access plaintext data at any time

Last updated