Get Started with Jackal Cloud
Get Started with Jackal Cloud
Jackal Cloud FAQ
With the Jackal Proof of Persistance algorithm, three redundant copies of your encrypted files will always exist on the system. In the event a storage provider goes offline, a digital contract will be broken and another storage provider will step in and copy your encrypted file from one of the other two existing copies on the network. Your data is safe on Jackal.
Files stored on Jackal are distributed to storage providers in a decentralized and end-to-end encrypted nature. This is to ensure Jackal users will never experience downtime often seen with legacy providers when an issue occurs in a specific geographic region or data center. Storage providers only store encrypted data so you can maintain an outstanding privacy and security posture.
Data stored on the Jackal Protocol is protected by both AES256 encryption and an Integrated Encryption Scheme based on AES and the Elliptic Curve used to gnerate Bech32 Addresses. AES-256 is currently considered post-quantum computing resistant and is often used to protect the worlds most important data.
Jackal uses ledger technology, distributed storage, and end-to-end encryption to ensure that only the end user with their private key stored in a cryptographic wallet can access data on Jackal. No one, not even the people that built Jackal can access your data. You have full ownership and control.
Jackal Cloud FAQ
With the Jackal Proof of Persistance algorithm, three redundant copies of your encrypted files will always exist on the system. In the event a storage provider goes offline, a digital contract will be broken and another storage provider will step in and copy your encrypted file from one of the other two existing copies on the network. Your data is safe on Jackal.
Files stored on Jackal are distributed to storage providers in a decentralized and end-to-end encrypted nature. This is to ensure Jackal users will never experience downtime often seen with legacy providers when an issue occurs in a specific geographic region or data center. Storage providers only store encrypted data so you can maintain an outstanding privacy and security posture.
Data stored on the Jackal Protocol is protected by both AES256 encryption and an Integrated Encryption Scheme based on AES and the Elliptic Curve used to gnerate Bech32 Addresses. AES-256 is currently considered post-quantum computing resistant and is often used to protect the worlds most important data.
Jackal uses ledger technology, distributed storage, and end-to-end encryption to ensure that only the end user with their private key stored in a cryptographic wallet can access data on Jackal. No one, not even the people that built Jackal can access your data. You have full ownership and control.
NEW USERS
Take Advantage of
2GB of Free Storage!