How does OneSafe maximize your cloud safety?

A Safe for your cloud

We wanted to spend some time in this post discussing how OneSafeBox keeps your data safe in a variety of scenarios such as when the cloud storage provider is down or when your account is compromised or when your internet traffic is being snooped.

When the cloud storage provider is down:

OneSafeBox uses what we call Mirror Technology to replicate your files across all of your cloud storage accounts.  If you upload an encrypted file via OneSafeBox then that file will be copied to all of your linked storage accounts.  If one store provider is down you can always access the file through one of your other accounts.  Just a few weeks ago Dropbox went down unexpectedly.  This wasn’t a problem for OneSafeBox users!

When your cloud storage account has been compromised:

Hackers often successfully compromise cloud storage accounts.  There have been examples of this recently in the news.  In October of last year it was revealed that 7 million Dropbox accounts were potentially compromised.  Prior to that was the highly covered celebrity photo leaks.

Files encrypted with OneSafeBox are safe from hackers and others that compromise accounts.  The reason is that these files are encrypted with a unique key known only to the user.  Someone gaining access to your account will see only encrypted nonsense when looking at your private data.

When your internet traffic is being snooped:

It is possible for a person or entity to view your internet traffic through a variety of methods, such as deep packet inspection performed by ISPs.  OneSafeBox protects your data from such methods in two key ways.  First, your data is never sent unenecrypted over the internet.  Files are always encrypted locally first before being sent to the respective cloud storage provider.  Second, your encryption keys are also never sent over the internet.  A hashed version of your encryption keys are stored in our service and sent to the device when encryption or decryption needs to be performed.  The client takes this hashed encryption key and is able to uniquely convert it into a key that can be used for encryption or decryption.

 

A user can easily prevent their data from being compromised via one of these common scenarios by using OneSafeBox.

Sign Up for FREE now!