Why is fragmentiX not available as a Service? Why a hardware box?
Coming from the field of digital forensics, our founder and technicians very quickly realised that the desired level of security of fragmentiX solutions can only be achieved in a very strictly controlled environment. This starts with the supply chain of all components and ends with securing the access authorisation required for communication with various cloud storage providers. It would be easy to implement fragmentiX as a “software-only”-solution, but this would not fulfil the required high level of protection for sensitive data.
Who can access the buckets holding a fragment of my data?
Everyone who has the correct login credentials (or was able to hack/breach into the server/provider) can access the data fragments in the S3 bucket.
All the available methods to protect a S3 bucket are exactly the same – no matter if you have your original data stored in a particular bucket – or a fragment that was produced by your fragmentiX appliance. The big difference is that with a fragment of your original data even the owner of a future quantum computer can not learn anything about the original data.
As a normal user without extensive IT skills - is it possible to install and use fragmentiX technology ?
Why should I trust fragmentiX? How can I be sure that they do not spy on my data?
Good and valid question! Since we are a privately held corporation in the geopolitically neutral country of Austria / Europe we had the luck not to be intimidated by government or law enforcement to include backdoors or other ways to compromise the security and privacy we can provide to our customers. As our clear vision is to bring digital sovereignty to our customers, we try very hard to do everything possible to achieve this. Only the owner/user of a fragmentiX appliance knows how they configured the system – so not even we as the developers and producers of the appliances have any way to learn this secret configuration data. The sensitive configuration data includes usernames, passwords and the credentials (again usernames/passwords and URLs etc.) of the LOCATIONS – the places where the actual fragments are stored. Please ask us for more details on how we protect this sensitive information!
Can I use fragmentiX to exchange sensitive data with partners?
Is the data recoverable, if one of the LOCATIONS (or more) is down?
For every fragmentiX-setup there is a configured Storage strategy in place called frX-ratio. Our demo setup for example has a 2/3 frX-ratio configured. For a 2/3 frX-ratio two out of three LOCATIONS need to be accessible to recover the complete data record, but there are other strategies available. Get in touch with us for more information regarding frX-ratios.
What is the name of the protocol that is in place for the communication between the fragmentiX desktop client and the appliances?
The fragmentiX desktop client uses a protocol that is called simple storage service or S3 via HTTPS to connect to the appliances.
Which cloud storage providers are approved for fragmentiX products? Why do they need approval?
So far, we have given approval that the fragmentiX Storage Appliance products work with Amazon AWS, Wasabi, Alibaba, Linode, Backblaze, ITandTel and MinIO as promised. Additionally, there is support for MS Azure BLOB, NFS-storages and even USB storage devices.
We test each and every cloud storage provider for functionality as LOCATION before approving it to keep the quality of our products and services at a high level.