¿Por qué el fragmentiX no está disponible como servicio? ¿Por qué una caja de hardware?
Coming from the field of digital forensics, our founder and technicians very quickly realised that the desired level of security of fragmentiX solutions can only be achieved in a very strictly controlled environment. This starts with the supply chain of all components and ends with securing the access authorisation required for communication with various cloud storage providers. It would be easy to implement fragmentiX as a “software-only”-solution, but this would not fulfil the required high level of protection for sensitive data.
¿Quién puede acceder a los buckets que contienen un fragmento de mis datos?
Everyone who has the correct login credentials (or was able to hack/breach into the server/provider) can access the data fragments in the S3 bucket.
Todos los métodos disponibles para proteger un cubo S3 son exactamente los mismos - no importa si tienes tus datos originales almacenados en un cubo particular - o un fragmento que fue producido por tu dispositivo fragmentiX. La gran diferencia es que con un fragmento de tus datos originales incluso el propietario de un futuro ordenador cuántico no puede saber nada de los datos originales.
As a normal user without extensive IT skills - is it possible to install and use fragmentiX technology ?
¿Por qué debo confiar en fragmentiX? Cómo puedo estar seguro de que no espían mis datos?
Good and valid question! Since we are a privately held corporation in the geopolitically neutral country of Austria / Europe we had the luck not to be intimidated by government or law enforcement to include backdoors or other ways to compromise the security and privacy we can provide to our customers. As our clear vision is to bring digital sovereignty to our customers, we try very hard to do everything possible to achieve this. Only the owner/user of a fragmentiX appliance knows how they configured the system – so not even we as the developers and producers of the appliances have any way to learn this secret configuration data. The sensitive configuration data includes usernames, passwords and the credentials (again usernames/passwords and URLs etc.) of the LOCATIONS – the places where the actual fragments are stored. Please ask us for more details on how we protect this sensitive information!
¿Puedo utilizar fragmentiX para intercambiar datos sensibles con mis socios?
Is the data recoverable, if one of the LOCATIONS (or more) is down?
For every fragmentiX-setup there is a configured Storage strategy in place called frX-ratio. Our demo setup for example has a 2/3 frX-ratio configured. For a 2/3 frX-ratio two out of three LOCATIONS need to be accessible to recover the complete data record, but there are other strategies available. Get in touch with us for more information regarding frX-ratios.
What is the name of the protocol that is in place for the communication between the fragmentiX desktop client and the appliances?
The fragmentiX desktop client uses a protocol that is called simple storage service or S3 via HTTPS to connect to the appliances.
Which cloud storage providers are approved for fragmentiX products? Why do they need approval?
So far, we have given approval that the fragmentiX Storage Appliance products work with Amazon AWS, Wasabi, Alibaba, Linode, Backblaze, ITandTel and MinIO as promised. Additionally, there is support for MS Azure BLOB, NFS-storages and even USB storage devices.
We test each and every cloud storage provider for functionality as LOCATION before approving it to keep the quality of our products and services at a high level.