Your data is end-to-end encrypted with a private key on your local mobile phone, tablet or computer. Storage nodes and apps can not access your data.
Your data is securely transmitted to nodes on the Verida Network.
Your data is split into separate databases with different encryption keys for enhanced security.
By default, data is stored on storage nodes located within your country or region.
You can also select specific storage nodes or operate your own.
Your data is replicated across multiple nodes for backup and redundancy.
Storage node operators complete a comprehensive verification process before joining the network.
Storage node operators must stake tokens to participate in the network.
These tokens can be destroyed if the node operator is malicious or delivers poor service.
You can login to applications to decrypt your personal data.
You can consent to share your personal data with others.
You can revoke third party access to your data at any time.
Application developers can not access your data.
You receive data requests from applications or organizations.
You can share your data or ignore the data request.
You can verify who requested the data and what access is granted.
You can revoke access by logging out of applications or disabling data sharing connection
Zero-Knowledge Credentials prove you hold personal information, without disclosing that information.
This allows you to prove your age or citizenship, without disclosing personal data such as your birthdate or passport number.
This significantly reduces the risk of leaking your personal data.
Automated vulnerability testing
Manual security testing
Review of the Verida architecture