Security by Design

fragmentiX Secret Sharing 

fragmentiX Technology

fragmentiX Secret Sharing offers worldwide real information-theoretic security with simplest usability. This allows to maintain digital sovereignty even in the emerging age of quantum computers: long-term protection against abuse, espionage and theft. With fragmentiX, internet giants, hackers and criminals can no longer get access to your data anymore, because only fragments without any useful information are stored on S3 locations. If one of the fragments is stolen, it is completely useless to the thief or spy. fragmentiX protects your data regardless of the type (backup files, multimedia data, documents, etc.) with ITS - information-theoretic security.

Digital sovereignty  can be seen as a tool for self-defense in our technology.

Secret Sharing

fragmentiX technology is based on secret sharing. The method of secret sharing describes that information is distributed among several players and a certain number of players is required to reconstruct the information. fragmentiX applies the method of secret sharing to digital files of any type and nearly any size. fragmentiX makes it possible to split even encrypted data into fragments to protect them with secret sharing.

One-Time-Pad-Encryption

The systematic encryption principle of one-time pad - OTP, which has been mathematically proven and well established for many years, serves secrecy. The key is at least as long as the information itself, which confirms information-theoretic security. Every single fragment is encrypted with OTP.

Act for your digital sovereignty A call or message will take you closer to your digital sovereignty.

fragmentiX configuration

The frXOS - the hardened operating system of the fragmentiX products - is designed for the owner/administrator to once select the 'frX-ratio' for each application scenario and the fragment storage locations. The 'frX-ratio' defines the created number of fragments and the required number of fragments for recovery. Depending on the model of the fragmentiX product, 3, 4, 8, 16 or 26 fragments can be created and any 'frX-ratio' can be selected (e.g. 4/6, 3/14 or 9/26). The smallest possible 'frX-ratio' is 2/3. 

frX-ratio = required number of fragments for recovery / created number of fragments.

The 'frX-ratio' ensures that desired effects such as high availability, high performance, long-term archiving, cost opimization or hyper-secure-offline can be achieved.

fragmentiX behind the scenes

The user stores his/her data as usual on a configured network drive.

The fragmentiX box uses secret sharing to split everything on this drive into fragments. The amount of created fragments and the fragment storage locations are defined by the owner/administrator.

The fragmentiX box stores the fragments over one or more internet connections in the cloud or on a local S3 bucket. 

Example of reconstruction

When a fragmentiX-ratio 2/3 is chosen, two out of three fragments - and no matter which two - are sufficient for the fragmentiX box to restore the original data. Even if one of the fragments is lost, data can be reconstructed with the remaining fragments.

What if one Fragment is being compromised?

A single fragment does not contain any usable information.

If one of the fragments is compromised or stolen, it is completely useless to the thief or spy as he/she does not get to the data with one single fragment. The user is prepared for emergency and can, even if one of the fragments is lost, reconstruct the data with the remaining fragments.