top of page

How the competition is confusing data sharding, with Secured2 patented data shredding

As described, sharding is a technique utilized in databases to enhance the speed of data queries by fragmenting the database into smaller chunks and distributing them across various nodes. Initially, it proved beneficial for expediting large data queries. However, sharding inadvertently gave rise to a security nightmare. If an unauthorized user manages to infiltrate even a single node or container, they can reconstruct the entire dataset. This creates a worrisome situation as the number of nodes increases, thereby increasing the potential threat vectors. It's crucial to understand that sharding does not function as a data security technology, as it does not dismantle data at the binary file level nor does it offer any data protection.

Now, let's turn our attention to Secured2, a cutting-edge security algorithm that takes data protection to the next level. It employs a multi-step approach, beginning with data randomization and breaking it down into small binary-level segments. Each of these segments is then distributed randomly across multiple physically isolated storage locations, offering customers the freedom to choose where their data resides. Think of it as transforming remote storage, such as the cloud, into a robust array of independent drives, fortified by the inherent redundancy of the cloud infrastructure itself. What sets Secured2 apart is its immunity to data reconstruction with just one segment. In the event of a breach, a malicious actor would only be left with a collection of scrambled ciphertext, rendering it useless. To truly access the dataset, they would need to infiltrate all the physically separated containers, decrypt every individual segment, painstakingly reassemble the data in its precise order, unveil its true form, decompress it, and further validate the identity to reverse the entire process. In essence, such a feat is tantamount to the impossible.

7 views0 comments



bottom of page