Skip to content

Cloud Storage

Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by either putting you in control of your data or by implementing E2EE.

If these alternatives do not fit your needs, we suggest you look into Encryption Software.

Nextcloud

Recommendation

Nextcloud logo

Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental E2EE.

Homepage Privacy Policy

Downloads

We recommend checking if your Nextcloud provider supports E2EE, otherwise you have to trust the provider to not look at your files.

When self hosting Nextcloud, you should also enable E2EE to protect against your hosting provider snooping on your data.

Proton Drive

Recommendation

Proton Drive logo

Proton Drive is an E2EE general file storage service by the popular encrypted email provider ProtonMail.

Website Privacy Policy

Downloads

Proton Drive is currently in beta and only is only available through a web client.

When using a web client, you are placing trust in the server to send you proper JavaScript code to derive the decryption key and authentication token locally in your browser. A compromised server can send you malicious JavaScript code to steal your master password and decrypt your data. If this does not fit your threat model, consider using an alternative.

Cryptee

Recommendation

Cryptee logo Cryptee logo

Cryptee is an encrypted, secure photo storage service, and an encrypted documents editor.

Website Privacy Policy

Downloads

Tahoe-LAFS

Note

Due to the complexity of the system and the amount of nodes needed to set it up, Tahoe-LAFS is only recommended for seasoned system administrators.

Recommendation

Tahoe-LAFS logo Tahoe-LAFS logo

Tahoe-LAFS is a free, open, and decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. The servers used as storage pools do not have access to your data.

Homepage

Downloads

Last update: May 16, 2022