Technology Overview

Decentralized Storage Approach

Storax leverages a network of independent nodes that contribute storage capacity. Core characteristics include:

  • Distributed physical storage: Data is split and stored across multiple nodes to prevent centralization.

  • Redundancy & replication: Automatic replication ensures durability even if nodes fail or go offline.

  • Fault tolerance: Byzantine-resilient architecture prevents malicious nodes from corrupting data.

  • Solana as a coordination layer: Only metadata, hashes, and proofs are stored on-chain.

Zero-Knowledge Proof Role

Zero-knowledge proofs enable nodes to demonstrate:

  • They store data correctly

  • They maintain required availability

  • They are replicating data as committed

  • They execute retrieval requests properly

…without ever revealing the data itself.

This preserves confidentiality while offering verifiable guarantees.

Encryption & Data Sharding

Storax employs:

  • Client-side end-to-end encryption

  • Sharding mechanisms, splitting data into cryptographically independent fragments

  • Distributed erasure coding for durability and low-cost reconstruction

  • Key-based access where only users hold decryption keys

Network Architecture Diagram (Described)

If visuals are unavailable, the architecture can be described as:

  1. Client Layer: Handles encryption, sharding, and interaction with network APIs.

  2. Solana Coordination Layer: Stores metadata, storage commitments, retrieval proofs, integrity checks, and ZK attestations.

  3. Storage Node Layer: Independent nodes store encrypted shards and generate ZK proofs verifying correct behavior.

  4. Audit Layer: Smart contracts verify ZK proofs and maintain a consistent record of storage compliance.

Data flows from the client → encrypted → sharded → distributed → proved → audited → retrieved.

Last updated