eFolder's Unique Data Integrity Assurance Systems
Our data integrity protection systems are second to none. Our end-to-end 256-bit checksums "tag" your data with cryptographically verifiable identifiers, and these
checksums are then used to verify the integrity of the data throughout the entire process. If corruption within a particular block is detected, a redundant copy of
that block is used to automatically repair the corruption.
The redundant copies of the data are split across physically separate raw storage devices each located in physically distinct storage subsystems. Storing the redundant
copies physically far away from each other ensures that clusters of disk failures due to localized vibration, enclosure failures, or IO controller failures do not affect
more than one redundant copy of the data, providing an unparalleled level of protection.
In addition to automatic detection and repair upon data access, all data is periodically verified against their end-to-end checksums to proactively identify and automatically repair silent data corruption.
As an additional measure of data integrity assurance, every data block backed up to our cloud is digitally signed by your encryption key and then verified during restore.
This provides cryptographic assurance that your data has not been tampered with by anyone and is 100% identical to what was originally backed up.