▶️
Decentrally Docs
  • ▶️DataDrop Intro
    • ☁️DataDrop Architecture
    • ⚒️How does DataDrop work
    • 🔐DataDrop Data security
    • 🤐Deletion handling
    • 📝Governance - GDPR - SOC
  • 🌐S3 Cloud Storage Intro
    • ☁️S3 Cloud Storage Architecture
    • ⚒️How does S3 Cloud Storage work
    • 🔐S3 Cloud Storage security
    • 🗨️SDKs & CLIs
      • 📋CLI
      • 📔Golang
Powered by GitBook
On this page
  • Metadata
  • Encryption keys
  • Chunking information
  • Final Thoughts

Was this helpful?

  1. DataDrop Intro

Deletion handling

In the realm of digital security and privacy, the irreversible deletion of data is just as critical as its protection. DataDrop upholds this principle through meticulous processes that ensure once a user decides to erase a file, it becomes irretrievable. The platform's deletion protocol is comprehensive and multi-layered, addressing every element that could possibly be used to reconstruct the data.

Metadata

When a deletion command is initiated, the system first purges the metadata associated with the file. This metadata includes all information about the file's structure, its location across the decentralized network, and any other descriptive details that could be used to identify or locate the chunks of data.

Encryption keys

Simultaneously, DataDrop annihilates the encryption keys. These keys are the only means to decrypt the data, translating it from an unintelligible state to a readable one. Once the keys are destroyed, the data, even if somehow located, remains an indecipherable cipher—permanently locked within its encrypted shell.

Chunking information

Furthermore, the platform eradicates the chunking information—the blueprint illustrating how the file is fragmented and scattered across the storage network. Without this blueprint, reconstructing the data from its dispersed chunks becomes a feat with astronomical improbability.

Final Thoughts

The absence of these critical components—metadata, encryption keys, and chunking information—renders the data not just inaccessible but essentially non-existent. It's akin to dispersing ashes into the sea; once done, the original form is lost forever. By obliterating these elements, DataDrop guarantees that deleted data, along with its potential to be accessed or recovered, is expunged from the digital world, assuring users that their digital footprint can be effectively and securely erased.

PreviousDataDrop Data securityNextGovernance - GDPR - SOC

Last updated 1 year ago

Was this helpful?

▶️
🤐