How does Myota encryption secure my data?

Myota is a secure storage service that emphasizes security and privacy, offering End-to-End encryption (E2EE) and Zero-Knowledge Encryption (ZKE) for data storage, sharing, archival and backup.

Myota Encryption Overview

Myota is a secure storage service that emphasizes security and privacy, offering End-to-End encryption (E2EE) and Zero-Knowledge Encryption (ZKE) for data storage, sharing, archival and backup. Myota is designed to ensure that your files are secure from all unauthorized access.

End-to-End Encryption (E2EE) and Zero-Knowledge Encryption (ZKE) are both cryptographic methods designed to protect data security and privacy, combined E2EE and ZKE provides a comprehensive solution that ensures data is protected at every stage—during transmission and while at rest. This combination enhances data confidentiality, privacy, and security, making it an ideal approach for sensitive and high-risk data scenarios, such as Ransomware targets.

Feature Myota End-to-End Encryption (E2EE) Myota Zero-Knowledge Encryption (ZKE)
Purpose Secures communication between data origination and destination. Ensures data privacy and control over stored data.
How It Works Data is encrypted and decrypted on the client side. Data is encrypted before being stored on the provider's servers.
Service Provider Access Service provider cannot read data in transit. Service provider cannot access or decrypt data.
Encryption Key Management Keys are managed by the customer. Keys are managed by Shred & Spread™ proces removing KMS attack surface.
Primary Use Case Securing communication. Protecting data stored in cloud storage or backup services.
Data Protection Scope Protects data during transmission between parties. Protects data at rest, ensuring privacy even from the provider.
Data Access Only the customer can access the data. Only the customer can access the data.
Focus Security during communication. Data privacy and user control over stored data.
Regulatory and Compliance Useful for compliance with communication security standards. Useful for compliance with data privacy regulations


Key Features

  • End-to-End Encryption: Myota can encrypt files before they are transferred and processed by our Zero-knowledge encryption technology. Only the customer holds the decryption keys, meaning Myota cannot access the content of the files.
  • Zero-Knowledge Encryption: Myota employs zero-knowledge encryption, ensuring that only the data owner has the keys to decrypt and access their information. This enhances user privacy and security.
  • Secure Sharing: Myota allows users to share encrypted files securely with others. Shared links can be protected with passwords, expiration dates, and access logs to enhance security.
  • Cross-Platform Support: Myota supports various platforms, including Windows, OSX and, Linux, allowing users to access their encrypted files across multiple devices.
  • Compliance: Myota is compliant with GDPR, CCPA, HIPAA, and other data protection regulations, making it suitable for organizations that handle sensitive data.
Benefits

Zero-knowledge encryption, often referred to as zero-knowledge proof encryption or zero-knowledge security, is a cryptographic method in which the service provider (Myota) does not have access to the encryption keys or the content of the data that is being encrypted. This means that only the customer can decrypt and access the data.

Key Characteristics of Myota’s Zero-Knowledge Encryption

  • Privacy and Security: Myota cannot access or read the data, ensuring that the data remains private and secure even if the service provider's systems are compromised.
  • User Control: The data owner has full control over the encryption keys, meaning that only they can decrypt and access the data. Myota cannot assist in decrypting the data, even if lawfully requested.
  • No Key Exposure: The encryption keys are never shared with or stored by Myota. This reduces the risk of key exposure or compromise.
  • Compliance and Trust: Zero-knowledge encryption is particularly useful for compliance with regulations that require strict data privacy, as it ensures that sensitive information is protected from unauthorized access.
How It Works
  • Client-Side Data Encryption: Myota encrypts the data on the client before uploading it to the remote storage repository (on-prem or cloud). This encryption process uses a key that only the user possesses.
  • Transport Layer Encryption: Myota uses HTTPS with Transport Layer Security (TLS) to encrypt data as it travels between clients (such as users or applications) and storage locations. TLS ensures that the data is encrypted and protected from interception or man-in-the-middle attacks during transmission.
  • Zero-Knowledge Encryption (ZKE) : Myota's Zero-Knowledge Encryption (ZKE) process, known as Shard & Spread™, breaks data into encrypted chunks and disperses them across multiple storage locations, ensuring that no single location holds enough information to reconstruct the original data. Both the data and its metadata are encrypted, and storage administrators, has no access to or knowledge of the data. This approach ensures that even in the event of a breach, the data remains secure and inaccessible to unauthorized parties. 
    • Data Storage: The encrypted data is stored on Myota storage, customer storage, or a hybrid. However, the data is encrypted with a key that Myota does not have, removing any ability to decrypt or read the data.