Skip to content

Cloud Storage

Cloud Storage cover image

Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.

If these alternatives do not fit your needs, we suggest you look into using encryption software like Cryptomator with another cloud provider. Using Cryptomator in conjunction with any cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.

Looking for Nextcloud?

Nextcloud is still a recommended tool for self-hosting a file management suite, however we do not recommend third-party Nextcloud storage providers at the moment, because we do not recommend Nextcloud's built-in E2EE functionality for home users.

Proton Drive

Proton Drive logo

Proton Drive is a Swiss encrypted cloud storage provider from the popular encrypted email provider Proton Mail.

Homepage

Downloads

The Proton Drive web application has been independently audited by Securitum in 2021, full details were not made available, but Securitum's letter of attestation states:

Auditors identified two low-severity vulnerabilities. Additionally, five general recommendations were reported. At the same time, we confirm that no important security issues were identified during the pentest.

Proton Drive's brand new mobile clients have not yet been publicly audited by a third-party.

Tresorit

Tresorit logo

Tresorit is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.

Homepage

Downloads

Tresorit has received a number of independent security audits:

  • 2022: ISO/IEC 27001:20131 Compliance Certification by TÜV Rheinland InterCert Kft
  • 2021: Penetration Testing by Computest
    • This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure.
    • Computest discovered two vulnerabilities which have been resolved.
  • 2019: Penetration Testing by Ernst & Young.
    • This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's white paper.
    • Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims."

They have also received the Digital Trust Label, a certification from the Swiss Digital Initiative which requires passing 35 criteria related to security, privacy, and reliability.

Criteria

Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.

This section is new

We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please ask on our forum and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.

Minimum Requirements

  • Must enforce end-to-end encryption.
  • Must offer a free plan or trial period for testing.
  • Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins.
  • Must offer a web interface which supports basic file management functionality.
  • Must allow for easy exports of all files/documents.
  • Must use standard, audited encryption.

Best-Case

Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.

  • Clients should be open source.
  • Clients should be audited in their entirety by an independent third-party.
  • Should offer native clients for Linux, Android, Windows, macOS, and iOS.
    • These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
  • Should support easy file-sharing with other users.
  • Should offer at least basic file preview and editing functionality on the web interface.

  1. ISO/IEC 27001:2013 compliance relates to the company's information security management system and covers the sales, development, maintenance and support of their cloud services. 


Share this website and spread privacy knowledge

Copy this text to easily share Privacy Guides with your friends and family on any social network!