fragmentiX Secret Sharing offers worldwide real information-theoretic security with simplest usability. This allows to maintain digital sovereignty even in the emerging age of quantum computers: long-term protection against abuse, espionage and theft. With fragmentiX, internet giants, hackers and criminals can no longer get access to your data anymore, because only fragments without any useful information are stored on S3 locations. If one of the fragments is stolen, it is completely useless to the thief or spy. fragmentiX protects your data regardless of the type (backup files, multimedia data, documents, etc.) with ITS - information-theoretic security.
can be seen as a tool for self-defense in our technology.
fragmentiX technology is based on secret sharing. The method of secret sharing describes that information is distributed among several players and a certain number of players is required to reconstruct the information. fragmentiX applies the method of secret sharing to digital files of any type and nearly any size. fragmentiX makes it possible to split even encrypted data into fragments to protect them with secret sharing.
The systematic encryption principle of one-time pad - OTP, which has been mathematically proven and well established for many years, serves secrecy. The key is at least as long as the information itself, which confirms information-theoretic security. Every single fragment is encrypted with OTP.
The frXOS - the hardened operating system of the fragmentiX products - is designed for the owner/administrator to once select the 'frX-ratio' for each application scenario and the fragment storage locations. The 'frX-ratio' defines the created number of fragments and the required number of fragments for recovery. Depending on the model of the fragmentiX product, 3, 4, 8, 16 or 26 fragments can be created and any 'frX-ratio' can be selected (e.g. 4/6, 3/14 or 9/26). The smallest possible 'frX-ratio' is 2/3.
frX-ratio = required number of fragments for recovery / created number of fragments.
The 'frX-ratio' ensures that desired effects such as high availability, high performance, long-term archiving, cost opimization or hyper-secure-offline
can be achieved.
fragmentiX behind the scenes
The user stores his/her data as usual on a configured network drive.
The fragmentiX box uses secret sharing to split everything on this drive into fragments. The amount of created fragments and the fragment storage locations are defined by the owner/administrator.
The fragmentiX box stores the fragments over one or more internet connections in the cloud or on a local S3 bucket.
Example of reconstruction
When a fragmentiX-ratio 2/3 is chosen, two out of three fragments - and no matter which two - are sufficient for the fragmentiX box to restore the original data. Even if one of the fragments is lost, data can be reconstructed with the remaining fragments.
What if one Fragment is being compromised?
A single fragment does not contain any usable information.