<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Storacha on Medium]]></title>
        <description><![CDATA[Stories by Storacha on Medium]]></description>
        <link>https://medium.com/@storacha?source=rss-d5242a9bcad1------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*fI7uGD1bWbB3_tCajXt-lg.png</url>
            <title>Stories by Storacha on Medium</title>
            <link>https://medium.com/@storacha?source=rss-d5242a9bcad1------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 11 Apr 2026 02:15:31 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@storacha/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[An Update on Storacha, and Important News for You and Your Data]]></title>
            <link>https://medium.com/@storacha/an-update-on-storacha-and-important-news-for-you-and-your-data-15a5d10b7da0?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/15a5d10b7da0</guid>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Fri, 03 Apr 2026 16:07:08 GMT</pubDate>
            <atom:updated>2026-04-03T16:07:08.123Z</atom:updated>
            <content:encoded><![CDATA[<p>When we built Storacha, we had one goal: build tools to make modern decentralized, access-controlled, verifiable storage easy for everyone.</p><p>Today, we’re announcing the next phase of that work: our technical team is joining <a href="https://fil.org/">Filecoin Foundation</a>. The open source technology we’ve built will accelerate the development of <a href="https://fil.one/?utm_medium=referral&amp;utm_campaign=storacha">Fil One</a>, a new S3-compatible Filecoin storage product that provides a unified Filecoin client experience. Fil One, which launched this week, is part of a new generation of Filecoin products, alongside the permissionless <a href="https://pin.filecoin.cloud/?utm_medium=referral&amp;utm_campaign=storacha">IPFS pinning</a> and <a href="https://github.com/FilOzone/filecoin-pay">payment smart contracts</a> of <a href="https://filecoin.cloud/?utm_medium=referral&amp;utm_campaign=storacha">Filecoin Onchain Cloud</a>.</p><p>The Storacha developer upload and IPFS service, however, will be shutting down.</p><p>That doesn’t mean your NFTs or your IPFS links have to break. Thanks to content-addressing and IPFS, you can seamlessly move your data to new pinning services. But you <em>will</em> have to move it — by the end of May at the very latest.</p><p>This post explains what’s changing, when, and what you need to do.</p><h3>What’s shutting down</h3><p>The Storacha developer upload service — Console, SDKs, and CLI, including UCAN support — is closing soon, and we’ll be winding down our IPFS services.</p><p>Here are the dates:</p><ul><li><strong>Effective immediately</strong>: No more sign-ups.</li><li><strong>April 15, 2026</strong>: We’ll be disabling uploads. The console, SDKs, and CLI will become read-only.</li><li><strong>May 1, 2026</strong>: Content will no longer be discoverable on the broader IPFS network, though our own w3s.link gateway will continue to provide access to your data.</li><li><strong>May 31, 2026</strong>: The Storacha gateways (w3s.link) will stop serving content. Uploaded data will no longer be accessible through Storacha.</li></ul><p>If you’re still uploading, <strong>April 15</strong> is your deadline for uploads. If you need to retrieve or migrate stored data, <strong>May 31</strong> is the cutoff. That means you’ll need to download your data if you don’t have it locally, and find an alternate IPFS service if you don’t already have one.</p><h3>No charges during the transition</h3><p>Paying customers will not be charged from April 1. You have the full transition period to retrieve your data at no cost.</p><h3>Migrating your data</h3><p>If your data is already pinned or backed up elsewhere, you may not need to do anything.</p><p>If you do need to move data off Storacha, your content remains accessible via the Storacha gateways through May 31. If you’d like a hand, we’ll be posting more detailed migration guides with step-by-step documentation by April 15.</p><p>For help planning your migration now, reach out at <a href="mailto:support@storacha.network">support@storacha.network</a>.</p><h3>Where to go next</h3><p>If you need ongoing IPFS or Filecoin storage, here are some great options:</p><ul><li><a href="https://fil.one/?utm_medium=referral&amp;utm_campaign=storacha">Fil One</a> offers S3-compatible object storage on Filecoin; the Storacha team will be working on Fil One at Filecoin Foundation.</li><li><a href="https://filecoin.cloud/?utm_medium=referral&amp;utm_campaign=storacha">Filecoin Onchain Cloud</a>’s <a href="https://docs.filecoin.io/builder-cookbook/filecoin-pin?utm_medium=referral&amp;utm_campaign=storacha">Filecoin Pin</a> service provides permissionless, onchain IPFS pinning and payments, part of the new Filecoin Web3 core.</li></ul><p>By April 15, the Storacha technical team will provide specific migration tools to help you migrate your data to these services, or to other IPFS pinning services.</p><h3>Thank you</h3><p>To everyone who stored data with us, hung out on Discord, came to our events, and built on top of our tools: thank you. We hope you continue to explore the world of decentralized storage, IPFS, and Filecoin with us.</p><p>— The Storacha Team <a href="mailto:support@storacha.network">support@storacha.network</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=15a5d10b7da0" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Using the Storacha Web Console for Managing Uploads]]></title>
            <link>https://medium.com/@storacha/using-the-storacha-web-console-for-managing-uploads-649206cc35aa?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/649206cc35aa</guid>
            <category><![CDATA[storacha]]></category>
            <category><![CDATA[cloud-services]]></category>
            <category><![CDATA[cloud-storage]]></category>
            <category><![CDATA[filecoin]]></category>
            <category><![CDATA[ipfs]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Tue, 10 Mar 2026 20:37:30 GMT</pubDate>
            <atom:updated>2026-03-10T20:37:30.200Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This guest post comes from </em><a href="https://medium.com/@fyattani"><em>Fatuma Yattani</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cQfV9fPram-qdYrtBw2ilA.jpeg" /></figure><p>Storacha is a decentralized storage platform built for real-world teams. It gives you the power of content-addressed storage with UCAN-based authorization, but without forcing you to become a cryptography expert.</p><p>If you are building an app with Storacha, you will eventually need a way to manage content, monitor uploads, and verify permissions. The Storacha Web Console provides exactly that: a simple, visual control center for your Spaces.</p><h3>What the Console Is For</h3><p>The Storacha Web Console is not a replacement for the Storacha client. It is a companion tool.</p><p>The Storacha client is used to build real applications and automate storage flows programmatically. The console is designed for human operators who need visibility, control, and verification.</p><p>You can think of it like this:</p><p>Storacha client is for building your app<br> Console is for managing and monitoring your Spaces</p><p>The console gives you a clear view of what is stored in your Space, who uploaded it, and whether each upload was authorized correctly.</p><h3>How to Access the Console</h3><p>The only official console entry point is:</p><p><strong>console.storacha.network</strong></p><p>When you open this link, you will be asked to authenticate using email.</p><p>Here is the exact flow:</p><ol><li>Visit <a href="http://console.storacha.network"><strong>console.storacha.network</strong></a></li><li>Enter your email address if you don’t have an account</li><li>Check your email for a verification message from Storacha</li><li>Click the link in the email to confirm your login</li></ol><p>This email-based login is the <strong>preferred and primary method</strong> for accessing the Storacha Web Console.</p><h3>What You See in the Console</h3><p>Once you log in, you will land on the dashboard.</p><p>The console dashboard is designed to be clean and intuitive, showing:</p><ul><li>Your Spaces</li><li>Upload history</li><li>Recent activity</li><li>Storage usage</li></ul><p>This is your control center. It provides an immediate snapshot of what is happening in your Storacha environment.</p><h3>Spaces: Your Storage Buckets</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*u77HPTeaseSuBBwWUUqrVw.png" /></figure><p>In Storacha, a <strong>Space</strong> is like a storage bucket.</p><p>It represents a secure container where content can be uploaded, stored, and managed.</p><p>In the console, you can:</p><ul><li>View all Spaces</li><li>Select a Space to see its contents</li><li>Inspect Space details such as DID and activity</li></ul><p>A Space is identified by a DID (Decentralized Identifier), and this DID is used as the authority reference in UCAN permissions.</p><h3>Uploading Files Through the Console</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QLSQorj93znNyaPa8AbKzA.png" /></figure><p>One of the most useful features of the console is that it lets you upload files directly.</p><p>This is useful for:</p><ul><li>Testing your Space</li><li>Verifying that your Space is correctly configured</li><li>Quickly uploading assets for demos</li></ul><p>The upload flow is simple:</p><ol><li>Select a Space</li><li>Click <strong>Upload</strong></li><li>Choose a file</li><li>Confirm upload</li></ol><p>When the upload completes, the console returns a <strong>CID</strong> (Content Identifier). This CID is the cryptographic fingerprint of the content stored in the Space.</p><h3>Understanding the CID</h3><p>The CID is the core concept behind content-addressed storage.</p><p>Instead of referring to files by name or location, you refer to them by their content fingerprint.</p><p>This has two major advantages:</p><ol><li><strong>Content integrity<br></strong>The CID guarantees that the content cannot be changed without changing the CID.</li><li><strong>Content deduplication<br></strong>If the same file is uploaded multiple times, it will produce the same CID, meaning the system can store it efficiently.</li></ol><p>The console makes it easy to copy the CID and use it in your applications or for verification.</p><h3>Upload History and Authorization Context</h3><p>Every upload in Storacha is content addressed and backed by verifiable authorization at upload time.</p><ul><li>When you inspect an upload in the console, you can view:<br> • the root CID<br> • a public gateway URL for the content<br> • the underlying CAR shard identifiers</li><li>This gives operators confidence that the data was stored correctly and can be retrieved deterministically.</li><li>At the time of writing, full UCAN proof chain details such as delegations and abilities are handled programmatically via the Storacha client and are not yet exposed in the console UI.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EQfNuqtm1qjWKCrxT_gGOA.png" /></figure><p>This is important because Storacha is built on the idea of <strong>cryptographic authorization</strong> rather than assumptions or hidden permissions.</p><h3>Why the Console Matters</h3><p>The console is valuable for multiple reasons:</p><h3>1. Quick validation</h3><p>Before you build an app, you can test storage flows and verify that your Space is configured correctly.</p><h3>2. Non-technical management</h3><p>Not everyone on your team is a developer. The console allows product managers and operators to manage uploads without code.</p><h3>3. Auditing</h3><p>You can inspect upload history and verify proof chains, which is essential for security and compliance.</p><h3>4. Debugging</h3><p>If your SDK integration is failing, the console helps you confirm whether the issue is with your code or with the Space configuration.</p><h3>Console vs SDK</h3><p>Both tools are important, but they serve different purposes.</p><h3>The console is best for:</h3><ul><li>Manual uploads</li><li>Testing</li><li>Auditing</li><li>Monitoring</li></ul><h3>The SDK is best for:</h3><ul><li>automated uploads</li><li>building apps</li><li>custom logic</li><li>generating delegations programmatically</li></ul><p>In practice, you will use both. The console for management and the SDK for production workflows.</p><h3>Final Thoughts</h3><p>The Storacha Web Console is a powerful tool for managing uploads and verifying access. It provides a clear, visual way to inspect your Spaces, monitor activity, and validate your storage configuration.</p><p>If you are new to Storacha, the console is the easiest way to start exploring the platform without writing code.</p><p>And once you are ready to build, the SDK will allow you to automate everything you did in the console.</p><h3>About Storacha</h3><p><em>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=649206cc35aa" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Debugging with the Storacha CLI: A Developer’s Guide]]></title>
            <link>https://medium.com/@storacha/debugging-with-the-storacha-cli-a-developers-guide-ac93e8150fe7?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/ac93e8150fe7</guid>
            <category><![CDATA[data-storage]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[cloud-storage]]></category>
            <category><![CDATA[cloud]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Thu, 15 Jan 2026 16:18:14 GMT</pubDate>
            <atom:updated>2026-01-15T16:18:14.266Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This guest post comes from </em><a href="https://medium.com/@fyattani"><em>Fatuma Yattani</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9tZ0g3UVDMrp_bir-BVo3Q.png" /></figure><p>When building on decentralized platforms like Storacha, debugging requires a new perspective. The process shifts from checking server logs and network routes to verifying cryptographic proofs and authority chains. This guide provides a clear framework for understanding and resolving issues with the Storacha CLI, helping you confidently navigate this different paradigm.</p><p>For developers who want to inspect data or explore Storacha’s internal structures, the<a href="https://github.com/storacha/debugger"> Storacha CLI debugger</a> provides commands for extracting multihashes, parsing delegations, and examining archived CAR files. It’s a resource for hands-on exploration,be sure to check it out.</p><p><strong>Why Debugging Storacha Feels Different</strong></p><p>With traditional centralized storage, an error like `Permission Denied` usually means checking a API key. In Storacha’s decentralized model, the same error requires you to verify a chain of relationships:</p><p>1. Your Agent Identity (the decentralized identifier or DID currently active in your CLI).</p><p>2. Your Active Space (the specific namespace you are targeting).</p><p>3. The UCAN Delegation (the cryptographically signed token that proves your Agent has permission to perform an action in that Space).</p><p>Failures are rarely about network reach; they are about **proofs, capabilities, and context. Understanding this is 90% of the solution.</p><p><strong>First Steps in Any Debugging Session</strong></p><p>When a command fails, start by methodically checking your environment. These initial commands can identify the majority of common issues.</p><p><strong>1. Confirm Your Identity and Context</strong></p><p>Always know who and where your CLI is operating. Your Agent (identity) and active Space (context) form the foundation of all subsequent operations.</p><p>a) Check your current Agent identity (who you are)</p><pre>$ storacha whoami<br>Agent DID: did:key:z6MkfrV…8h3</pre><p>b) List all Spaces you have access to and see which is active</p><pre>$ storacha space ls<br>NAME DID ACTIVE<br>web-assets did:key:z6MkixX… true<br>archive-data did:key:z6MkaB2… false</pre><p>c) If the wrong Space is active, switch to the correct one</p><pre>$ storacha space use archive-data</pre><p><strong>2. Inspect Your Authorizations (UCANs)</strong></p><p>Permissions in Storacha are explicit and granular. Use this command to see what capabilities your current Agent possesses for the active Space.</p><p>List all active delegations (UCAN proofs) for your current context</p><pre>$ storacha delegation ls<br>RECIPIENT ABILITIES EXPIRES<br>did:key:z6MkfrV… space/blob/add 2024–12–31<br>did:key:z6MkfrV… upload/add 2024–10–15 ⚠️ EXPIRED</pre><p><strong>What to look for:</strong></p><ul><li>Missing Abilities: Do you see the necessary capability (e.g., `space/blob/add` for uploads)?</li><li>Expired Proofs: Has the delegation for a critical ability expired?</li></ul><p><strong>Diagnostic Flowchart: Finding the Issue</strong></p><p>Follow this logical path to isolate the root cause of most problems.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/417/1*JF_UQRKSvNm6qM65DNynGg.png" /></figure><p><strong>Common Debugging Scenarios and Fixes</strong></p><p>Scenario 1: Proof Invalid on Upload</p><p>This is the most common authorization error. It means the UCAN proof your Agent is presenting does not validate for the requested operation.</p><p>The Fix:</p><p>1. Ensure you are in the correct Space (see First Steps above).</p><p>2. Check your delegations for the `upload/add` or `space/blob/add` ability.</p><p>3. If it’s missing or expired, a user with admin rights to the Space must grant you a new delegation.</p><p>Example: An admin creates a new delegation for a developer</p><pre># Generate Unix timestamp for Dec 31, 2024 23:59:59<br>EXPIRE_TS=$(date -d “2024–12–31 23:59:59” +%s)<br><br># Create delegation<br>storacha delegation create did:key:z6Mk7b9… \<br> - can &#39;space/blob/add&#39; \<br> - can &#39;upload/add&#39; \<br> - expiration $EXPIRE_TS \<br> - name &quot;Developer Delegation&quot; \<br> - type app \<br> - output developer-delegation.car</pre><p>he developer would then load this new CAR file (developer-delegation.car) to update their permissions. After this, uploads using the delegated capabilities should succeed.</p><p>Scenario 2: Upload Hangs or Times Out</p><p>When `storacha up` gets stuck, the issue is often at the network layer or related to the file itself.</p><p>Diagnostic Steps:</p><p>1. Enable verbose logging to see the internal process:</p><pre>storacha up ./large-video.mp4 — verbose</pre><p>2. Analyze the output. Where does it hang?</p><ul><li>Computing CID…: The CLI is hashing your file. For very large files, this takes time.</li><li>Signing with UCAN proof…: Authorization is being prepared.</li><li>Connecting to IPFS nodes…: This is the network transfer phase. A timeout here suggests a firewall or connectivity issue.</li></ul><p>3. Test with a small file to isolate the problem:</p><pre>$ echo “test” &gt; small.txt<br> $ storacha up small.txt</pre><p>Scenario 3: Content Not Retrievable via Gateway</p><p>You get a CID back from an upload, but `storacha open &lt;cid&gt;` or a public gateway returns nothing.</p><p><strong>Possible Causes and Checks:</strong></p><p>* Incomplete Upload: The network may not have fully propagated the data. Wait a moment and try again.</p><p>* CID Mismatch: Double-check that the CID you are trying to open matches the one output by the `storacha up` command exactly.</p><p>* Gateway Health: Test if the gateway itself is operational.</p><pre>$ curl -I https://storacha.link/ipfs/bafybeia4gshp24x5s5ngbofr2jlsnwq2jqvl4kxbqaeyfjnaxu4eh4bawi</pre><p>Automating Checks with Scripts</p><p>1. Check Authentication &amp; Context</p><p>Checking Agent and Space context…</p><pre>storacha whoami &gt; /dev/null &amp;&amp; echo “ ✅ Agent authenticated.”<br>ACTIVE_SPACE=$(storacha space ls | grep “true” | awk ‘{print $1}’)<br>echo “ Active Space: $ACTIVE_SPACE”</pre><p>2. Test a Small Upload</p><p>Testing upload functionality…</p><pre>TEST_FILE=”/tmp/storacha_test_$(date +%s).txt”<br>echo “Test payload $(date)” &gt; $TEST_FILE<br>if CID=$(storacha up $TEST_FILE 2&gt;&amp;1 | grep -o ‘bafy[^ ]*’); then<br> echo “ ✅ Upload succeeded. CID: $CID”<br> # 3. Test Retrieval<br> if storacha open $CID &gt; /dev/null 2&gt;&amp;1; then<br> echo “ ✅ Content is accessible via gateway.”<br> else<br> echo “ ⚠️ Uploaded but not immediately retrievable.”<br> fi<br>else<br> echo “ ❌ Upload test failed.”<br> exit 1<br>fi<br>echo &quot;✅ All basic health checks passed.&quot;</pre><p>This script can be run from a CI/CD pipeline or a scheduled cron job.</p><p><strong>Best Practices and Pro Tips</strong></p><ol><li>Start a Debug Session Methodically: Always run `whoami` and `space ls` first. This eliminates guesswork.</li><li>Leverage Structured Output: Use the ` — json` flag with commands to parse outputs programmatically in scripts.</li><li>Keep Delegations Minimal: When creating UCANs, grant only the abilities needed (` — can`) and set reasonable expirations (` — expires`). This follows the principle of least privilege.</li><li>Maintain a Delegation Log: Keep a simple record (a text file or spreadsheet) of outstanding delegations, their purpose, and expiration dates to avoid surprises.</li></ol><p><strong>Where to Find Help</strong></p><p>If you’ve worked through these steps and are still stuck, the decentralized community is your best resource.</p><p>1. Official Documentation: The [Storacha Docs](https://docs.storacha.network/) are the definitive source for CLI options and concepts.</p><p>2. Community Support: Ask specific questions in the [Storacha Discord](https://discord.gg/storacha). Providing your error output and the steps you’ve already tried will get you better help faster.</p><p>3. Code and Issues: Check the [Storacha CLI GitHub Repository](https://github.com/storacha-labs/cli) to see if your issue is a known bug or to report a new one.</p><p>Debugging with Storacha is a skill that reinforces a deeper understanding of decentralized systems. By learning to trace the flow of authority through identities, spaces, and cryptographic proofs, you gain not just the ability to fix problems, but to build more robust and intentional applications on the decentralized web.</p><h3>About Storacha</h3><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ac93e8150fe7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Internet Is Permissioned Wrong. But UCAN Fix It.]]></title>
            <link>https://medium.com/@storacha/the-internet-is-permissioned-wrong-but-ucan-fix-it-439c36c5dc79?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/439c36c5dc79</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[cloud-storage]]></category>
            <category><![CDATA[encryption]]></category>
            <category><![CDATA[cryptography]]></category>
            <category><![CDATA[internet]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Mon, 08 Dec 2025 02:42:57 GMT</pubDate>
            <atom:updated>2025-12-08T05:02:51.704Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This post comes from Storacha`s Co-founder </em><a href="https://www.linkedin.com/in/techgirlwonder/"><em>Hannah Howard.</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9oQjgZZbk41wn3AMp85_7g.png" /></figure><p><strong>Imagine this:</strong> you’re out to dinner when the baby sitter calls you. She just got home from an outing with your kids but can’t get into your house.</p><p>You realize you didn’t let the big company that manages your home access know that you’d like her to be able to get in.</p><p>You try to login on the company website but it’s down for maintenance. It’s pouring rain. You drive home, only to find the rain caused an internet outage.</p><p>Without the company, even you can’t get in. You curse this company. You think to yourself “I’d switch tomorrow, but there’s a catch.” The catch is you’d have to sell your house and buy a new one.</p><p>This bizarre, contrived nightmare is what would happen in a world where for some reason, we didn’t just control access to our homes ourselves with simple locks and keys.</p><p>And yet, it closely approximates the way permissioning works on today’s internet.</p><p><strong>How did we get here?</strong></p><p>The early internet was a decentralized hodge podge of websites where all data was public. At some point, the internet needed permissions.</p><p>Early builders adopted existing technologies companies used for internal networks, a centralized directory of permissions managed by the company.</p><p>They applied the same model to websites, with each website managing a list of users, identities, permissions. That’s the internet we have today.</p><p>Unfortunately, using a permissioning model designed for working at a closed company leads to an open internet that feels a bit like digital serfdom.</p><p>Today, our data is locked in silos we don’t control. We need to remember a million passwords just to access it. Sometimes we have to pay just to share it.</p><p>Meanwhile most of the actual sharing happens because the company we stored our data with decides to sell it.</p><p><strong>It makes you wonder: did no one invent a digital equivalent of a good old fashion key?</strong></p><p>Cryptographic keys are everywhere on the internet today, and they allow us to unlock things. But that’s really only one half of what a key does.</p><p>My car key unlocks my car, and only my car, but it also gives me the right to drive it. By possessing my car key, I can drive my car without having to prove myself to anyone (unless I get pulled over for speeding).</p><p>I can give someone my car key so they can drive my car to pick up groceries. A real world key isn’t just to unlock, it gives you a capability as well.</p><p>Fortunately, this kind of digital key, one that both unlocks and grants capabilities, has existed in research labs for decades.</p><p>Now, as the internet becomes increasingly unusable under the weight of centralized permissions, web3 builders are by necessity looking for better solutions more suited to decentralized blockchain ecosystems.</p><blockquote>In doing so, we’re rediscovering capability research. Now Storacha is betting big on User Controlled Access Networks, or UCANs, a technology that realizes the potential of this research for today’s internet.</blockquote><p><a href="https://console.storacha.network/?utm_source=medium&amp;utm_medium=post&amp;utm_campaign=Internet+Is+Permissioned"><strong>Setup a space here with 5GB free.</strong></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Oo7EABye_Lma569_J2Zo3g.png" /></figure><h3><strong>How Storacha Uses UCAN</strong></h3><blockquote>Storacha helped co-create UCAN along with authors Brooklyn Zelenka, Irakli Gozalishvili, Daniel Holmgren, and Philipp Krüger.</blockquote><blockquote><strong>What is UCAN?</strong> (User Controlled Access Network) is a decentralized authorization protocol that uses cryptographic keys to grant capabilities, not just unlock access. Unlike OAuth or traditional API keys that rely on centralized servers, UCANs are self-contained tokens that work offline and enable peer-to-peer permission delegation.</blockquote><p>UCAN technology is infused into almost every layer of our storage product. With the flexible digital keys UCAN provides, Storacha can do things you simply can’t do easily with any other storage product.</p><p><strong>Consider the following real world Storacha customers and partners:</strong></p><ul><li>Starling Labs and the Shoah Project enable journalists around the world to capture images and stories and upload to Storacha, without Storacha ever knowing their individual identities.</li><li>OpenSea allows their users to upload to their storage account, but limits their capabilities on how much each user can upload based on a payment plan. Storacha plays no role in OpenSea’s user management.</li><li>LIT Protocol offers a decentralized platform for secure encryption and private key management. Storacha’s encrypted upload client (public launch out soon, but already available in our open source libraries) combines LIT’s technology with UCANs to unlock something truly special: encrypted private data you can share, without re-encrypting, and without relying on centralized service for access control.</li></ul><p><strong>UCAN technology isn’t just important for customers, it’s critical to building Storacha’s decentralized storage network.</strong></p><p>While blockchains are great as public ledgers to store critical accounting of transactions in decentralized systems, they’re still a bottleneck to network speed, when often a transaction can simply occur between two parties without going back to a central chain.</p><p>UCAN technology enables multiple parties to work together on behalf of a user, without a coordinating authority, because every action taken can be provably tied back through a cryptographic chain of provenance to an end user’s original intent (as well as their capability to carry out that intent).</p><p><a href="https://docs.storacha.network/concepts/ucans-and-storacha/">Read UCAN technical specs here.</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*stSIrtSz9JsOtbgj-akPyg.png" /></figure><h3>Towards a More Open and Empowered Internet</h3><p>UCAN technology reflects a broader movement, a return to the foundational ideals of the internet: openness, innovation, and user agency. Originally conceptualized by Brooklyn Zelenka and others, UCANs are now being implemented by teams like Storacha and Infura as real-world solutions to the challenges of access control in a decentralized world.</p><p>For a generation that grew up in the shadow of closed platforms and centralized control, this shift may seem radical. But just a decade ago, the internet was alive with independent creators, open standards, and emergent networks. And before that, it was a vast, chaotic playground for collective expression. The internet can be that again — and more.</p><p>Storacha is committed to building the infrastructure for that future. UCANs are a key building block in making decentralized, user-owned systems viable at scale. We’re just getting started — and we invite you to build with us.</p><p><a href="https://console.storacha.network/?utm_source=medium&amp;utm_medium=post&amp;utm_campaign=Internet+Is+Permissioned"><strong>Setup a space here with 5GB free.</strong></a></p><h3>FAQ</h3><ol><li><strong>How does UCAN work?</strong> UCANs chain cryptographic capabilities from a root authority (the user) through delegated permissions, creating provable authorization without centralized validation.</li><li><strong>What’s the difference between UCAN and OAuth? </strong>OAuth requires online server validation; UCAN tokens are self-contained and work offline. OAuth centralizes control with the service provider; UCANs give users direct control over permission delegation.</li></ol><h3>About Storacha</h3><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><p><strong>Key People: </strong>Brooklyn Zelenka: UCAN co-creator, Fission founder, Storacha team: Former IPFS/Filecoin core developers at Protocol Labs</p><p><strong>Related Technologies:</strong> <br>1. DID (Decentralized Identifiers): W3C standard for self-sovereign identity <br>2. IPLD (InterPlanetary Linked Data): Content-addressed data structures, Filecoin: Decentralized storage blockchain backing Storacha</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=439c36c5dc79" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Storage Sweet Spot Enterprises Have Been Waiting For]]></title>
            <link>https://medium.com/@storacha/the-storage-sweet-spot-enterprises-have-been-waiting-for-59d169958afa?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/59d169958afa</guid>
            <category><![CDATA[data-storage]]></category>
            <category><![CDATA[storage]]></category>
            <category><![CDATA[cloud-storage]]></category>
            <category><![CDATA[decentralized-storage]]></category>
            <category><![CDATA[cloud-services]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Fri, 14 Nov 2025 15:33:58 GMT</pubDate>
            <atom:updated>2025-11-29T06:35:21.017Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zEeih-j02o94My8-Q5rsug.jpeg" /></figure><p>Storacha Forge is a decentralized backup service built for organizations drowning in huge datasets that need long-term retention but not constant access.</p><p>It runs on verifiable decentralized infrastructure, with predictable pricing, true data sovereignty, using the Filecoin Onchain Cloud as part of its onchain verification layer.</p><p>If you’re storing terrabytes or petabytes of compliance archives, digital assets, historical analytics, AI training data, blockchain state backups, digital media repositories, or research and compliance records, Storacha Forge gives you the warm storage tier enterprises have been missing.</p><p>Want to talk deployment? 👇</p><p><a href="https://meetings-ap1.hubspot.com/storacha">https://meetings-ap1.hubspot.com/storacha</a></p><h3><strong>Why This Is a Big Deal</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*I8gF1j39jX9hiFbNERfaag.jpeg" /><figcaption>Storacha Forge Cost Comparison Table</figcaption></figure><p>For years, enterprises have had two terrible choices:</p><ul><li>Pay hot-storage prices for data you barely touch</li><li>Or shove it into cold storage and wait hours to get it back</li><li>Cloud providers pretend to offer a “middle tier,” but hidden retrieval fees, slow speeds, and vendor lock-in keep it way closer to cold storage.</li></ul><p>Storacha Forge finally delivers the middle tier everyone expected.</p><ul><li>$5.99 per TiB per month</li><li>Drops to $1 per TiB after 18 months with lifecycle management</li><li>Plus decentralized, verifiable storage.</li></ul><h3><strong>The Real Cost Problem</strong></h3><p>Cloud pricing pushes you into extremes:</p><ul><li>S3 Standard: around $23 per TiB monthly</li><li>Glacier Deep Archive: $0.99 per TiB, up to 48 hours to retrieve, plus fees that can hit hundreds per TiB</li></ul><p>But real enterprise data sits somewhere between “hot” and “frozen.”</p><p>Think:</p><ul><li>AI training datasets</li><li>DePIN telemetry and sensor data</li><li>Blockchain state and node backups</li><li>Media and rights repositories</li><li>Research, compliance, and financial archives</li></ul><p>These workloads can’t wait half a day, but they don’t need instant speed either. At $5.99 per TiB, Storacha Forge delivers about 75% savings vs S3 Standard while staying far more accessible than cold storage. For petabyte-scale orgs, that’s a full reset of storage economics.</p><h3><strong>Why Decentralized Storage Actually Helps</strong></h3><p>This isn’t ideology. It’s just practical.</p><p><strong>1/ Much Lower Egress Fees </strong>AWS egress can hit $90 per TiB. Storacha Forge egress is $10 per TiB, which is 80% to 90% cheaper. And your data isn’t trapped by any single provider’s decisions.</p><p><strong>2/ Verifiable Storage </strong>Cryptographic proofs confirm your data is stored correctly, unchanged, and available.</p><p>Regulated industries love this.</p><p><strong>3/ Protocol Governance </strong>Your storage terms follow protocol rules, not quarterly earnings surprises or sudden pricing pivots.</p><p><strong>4/ Flexible Locations </strong>It supports data sovereignty across multiple regulatory environments without giving up accessibility or performance.</p><h3><strong>Who Gets the Most Out of Storacha Forge</strong></h3><ul><li>AI and Media teams managing training data, model checkpoints, and digital assets</li><li>Financial and regulated industries keeping audit-ready records plus long-term archives</li><li>DePIN and blockchain networks storing telemetry, state, and transaction data</li><li>Research and academia generating massive datasets with declining access needs</li><li>Public sector and government needing transparent pricing and strong data sovereignty</li><li>SaaS and digital businesses dealing with fast-growing analytics, logs, and user backups</li></ul><h3><strong>Simple, Transparent Pricing</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*7xAG-VzYkVHLn64f_y8UgQ.jpeg" /><figcaption>Storacha Forge Pricing</figcaption></figure><ul><li>$5.99 per TiB per month for storage</li><li>$10 per TiB egress</li><li>Free onboarding for 18-month contracts</li><li>$1 per TiB per month cold storage after 18 months</li></ul><h3><strong>Bottom Line</strong></h3><p>Enterprise data never fit neatly into “hot” or “cold.”</p><p>Storacha Forge introduces a real infrequent-access tier for large datasets that stay important but aren’t touched constantly.</p><p>You get predictable costs, verifiable durability, decentralized infrastructure, clean billing, and clarity on where your data lives.</p><p>For storage architects, data engineers, and IT teams, Storacha Forge is a practical long-term solution for keeping semi-active data secure and accessible.</p><h3><strong>Get Started</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EKB5PObGAj9tmDPhal-GWw.jpeg" /><figcaption>Storacha Forge — Book a call with the team.</figcaption></figure><p>Connect with our team through 👇</p><p><a href="https://meetings-ap1.hubspot.com/storacha">https://meetings-ap1.hubspot.com/storacha</a></p><h3>About Storacha</h3><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data.</p><p>Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs, a breakthrough in decentralized access control.</p><p>Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59d169958afa" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Decentralized by Default: The Internet’s Comeback Story]]></title>
            <link>https://medium.com/@storacha/decentralized-by-default-the-internets-comeback-story-85cc79c3fc9d?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/85cc79c3fc9d</guid>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[data]]></category>
            <category><![CDATA[search]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[storage]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Mon, 06 Oct 2025 05:55:36 GMT</pubDate>
            <atom:updated>2025-12-02T11:06:20.613Z</atom:updated>
            <content:encoded><![CDATA[<p><em>We sprinted into cloud lock-in; now we’re waking up to vanished links, throttled reach, and brittle outages. Ownership is the only upgrade.</em></p><blockquote>Introducing an unstoppable partnership between Storacha &amp; Presearch.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*bk7WInozWN9WVkDYpx1J9g.gif" /></figure><p>The modern internet has become synonymous with a few companies.</p><p>A few who decide what we discover. A few who control where we store data. A few holding the keys to how most people access and cultivate knowledge online.</p><p>This dominance has gone largely unquestioned for decades, and the status quo has come at the cost of privacy, control, and independence.</p><p>The antidote is to intentionally rebuild the tools that have become integral to the human experience online.</p><p>Storage should not be locked in proprietary silos. It should be distributed across verifiable, community-powered networks.</p><p>Search should not be controlled by one company. It should be operated by thousands of independent participants.</p><p>Those rebuilding with purpose share the same goal: putting people first. This is where projects like <strong>Storacha and Presearch are aligning their efforts to make that future a reality even faster.</strong></p><p><strong>Presearch is a search engine</strong> that enables people to access information without profiling, filtering, or surveillance.</p><p>You can search without having your habits manipulated for ad dollars, all through the power of a decentralized infrastructure.</p><p><strong>Storacha decentralizes storage </strong>giving true data ownership while ensuring that once data is created, it remains fast, verifiable, and accessible without relying on a single provider.</p><blockquote><em>Together, decentralized search and storage form the backbone of a free internet.</em></blockquote><h3>Why Is Centralization a Problem?</h3><p>Centralization means essential online services are in the hands of a single company or a very small group.</p><p>When you search on Google, one corporation’s algorithm chooses which results appear first.</p><p>When you store files in iCloud, one company controls the servers, the rules, and even whether you keep access.</p><p>It leaves billions of people dependent on a few gatekeepers.</p><p>Leading to four reasons why centralization is a problem:</p><p>1. Censorship and Suppression</p><p>Content can be buried, deprioritized, or removed with little transparency. Expanded information, independent journalism, and non-mainstream topics are often pushed out of sight.</p><p>2. Surveillance Capitalism</p><p>Every search, click, and upload becomes a data point sold to advertisers and used to refine a profile of your behavior.</p><p>3. Fragility</p><p>When major cloud services go down, a majority of the internet shuts down. One decision or mistake by a centralized provider can erase entire communities.</p><p>4. Bias<br>Algorithms optimized for advertising and engagement skew the information landscape. The results you see are what is most profitable, not what is most accurate or useful.</p><p>Decentralizing essential tools on the web reverses this imbalance that has gone on long enough.</p><p>Power is distributed across networks of people all across the globe, removing single points of failure or manipulation.</p><p>Communities of people are the core of the infrastructure and principles of a shifted system.</p><p>The shift has already happened through projects like these that enhance the pillars of the internet: how we find information and how we store it.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5gj8sL2EnQbW3jfLTR75kQ.png" /></figure><h3>Presearch: Decentralized Search Engine</h3><p>Search is how most of the internet is navigated. It’s how we find information, evaluate opinions, and accumulate knowledge.</p><p>Today, that key navigation tool is owned by a few corporate entities fueled by surveillance and advertising</p><p>Presearch is the <strong>alternative search engine</strong> for people who don’t want their data in the hands of companies who will sell it to the highest bidder.</p><blockquote><em>Searches are routed through a network of computers, </em><strong><em>owned by people</em></strong><em> just like you, which removes the link between the user and the query.</em></blockquote><p>Presearch does not track user activity or build behavior profiles. Search results are not tied to your identity or location.</p><p>This means that your results are not filtered, and you break out of the echo chamber to discover more with less corporate limitations.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JbDq-VLvNIwqGyH0MI8knA.png" /></figure><h3>Storacha: Decentralized Storage</h3><p>If search is how we find information, <strong>decentralized storage ensures it remains accessible.</strong></p><p>Storacha is a next-generation hot storage network built on IPFS and Filecoin, designed for fast, verifiable data retrieval.</p><p>Decentralized nodes keep frequently used data fast, and every file is cryptographically provable, so you know it’s your authentic, non-tampered data.</p><p>You don’t have to trust a single company, the trust is mathematically written in code.</p><p>Ownership and permission is kept in your hands, not a corporation’s, through UCANs, or User Controlled Authorization Networks.</p><blockquote><em>Through speed, transparency, and sovereignty, Storacha provides a decentralized alternative to the corporate chokehold on your files.</em></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iTuMleCzSpSwHQJGtfv4JA.png" /></figure><h3>How Search and Storage Work Together</h3><p>Search without storage is fragile. Storage without search is invisible. Together, decentralized search and decentralized storage create a complete ecosystem for knowledge.</p><p>Presearch makes sure information can be found and helps you uncover suppressed content, all while maintaining your privacy.</p><p>Storacha makes sure that information endures while you have ownership.</p><p>This pairing matters because the problems of centralization are not isolated. They reinforce each other.</p><p>When storage is centralized, content can be deleted. When search is centralized, even surviving content can be buried.</p><p>Only by addressing both can we build an internet that is resilient, fair, and open.</p><h3>Why This Matters Now</h3><p>The urgency of decentralization has grown in recent years. AI systems increasingly determine what we read, watch, and believe.</p><p>They inherit the same biases that legacy information systems have been plagued with. Governments are pressuring platforms to police content more aggressively.</p><p>Outages at major cloud providers highlight the fragility of depending on a few data centers.</p><blockquote><em>If we continue to rely on centralized search and storage, these trends will only intensify. AI models will be trained on biased data.</em></blockquote><p>Content will disappear without recourse. And the boundaries of discovery will be set not by what exists, but by what corporations allow.</p><p>Decentralization offers a way out. It ensures that discovery remains open and that knowledge remains permanent.</p><p>It restores agency to users and communities. It builds resilience into the very fabric of the web.</p><p>The internet’s future will not be secured by accepting the status quo. It requires a foundation that prioritizes privacy, permanence, and independence.</p><p>Decentralized search engines like Presearch and decentralized storage networks like Storacha represent two critical steps toward that foundation.</p><p>The choices we make today about how we search, store, and share information will shape not just the future of the internet, but the future of knowledge itself.</p><h3>Choose the Internet That Serves You</h3><p>When you choose decentralized tools, you’re saying the web should serve people and communities, not gatekeepers.</p><p><strong>Start here:</strong></p><ul><li><strong>Search privately:</strong><a href="https://presearch.com"> presearch.com</a></li><li><strong>Store it fast &amp; verifiably:</strong> <a href="https://shorturl.at/Gl3Kx">storacha.network</a></li><li><strong>Learn more:</strong> Presearch:<a href="https://presearch.com/learn-more"> presearch.com/learn-more</a> · Storacha Blog:<a href="https://storacha.network/blog"> storacha.network/blog</a></li></ul><h3>About Storacha</h3><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=85cc79c3fc9d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to Build Private Storage Into Any App: Inside DMAIL’s Integration with Storacha.]]></title>
            <link>https://medium.com/@storacha/how-to-build-private-storage-into-any-app-inside-dmails-integration-with-storacha-134347180fb6?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/134347180fb6</guid>
            <category><![CDATA[encryption]]></category>
            <category><![CDATA[data-privacy]]></category>
            <category><![CDATA[data-storage]]></category>
            <category><![CDATA[decentralized-storage]]></category>
            <category><![CDATA[web3-development]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Wed, 17 Sep 2025 02:42:21 GMT</pubDate>
            <atom:updated>2025-12-02T11:05:37.271Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This guest post comes from </em><a href="https://linktr.ee/dhruvvarshney"><em>Dhruv Varshney (Devrel @Storacha).</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4fjWAS4bAS8heDse4gZRlw.png" /></figure><p><strong>What if “add private storage” was just an iframe?</strong></p><p>DMAIL wanted private, wallet-native storage without trashing UX, so Storacha shipped an iframe pattern that drops <strong>military-grade encrypted storage</strong> into any SSO in <strong>~30 minutes</strong>. DMAIL’s the first case study; any app can copy-paste it.</p><h3>Encryption Without the Headache</h3><p>DMAIL’s users are already comfortable with decentralized systems, but that doesn’t mean they want to manage cryptographic keys. The challenge was building enterprise-grade encryption that felt as simple as dragging a file into a folder.</p><p>Here’s what Storacha built:</p><ul><li>Files encrypted before leaving the user’s device</li><li>Zero-knowledge architecture (even Storacha can’t see their data)</li><li>Seamless integration with their existing workspace</li><li>Enterprise compliance without enterprise complexity</li><li>The ability to share and revoke access instantly</li></ul><p>The solution involved three key pieces: <strong>UCANs</strong> for authorization, <strong>client-side encryption</strong> for security, and an <strong>iframe integration</strong> that makes it feel native to their app.</p><h3>How It Actually Works</h3><p>In DMAIL’s workspace, users see various widgets for different services — crypto analytics, portfolio tracking, data platforms. When they click on the Storacha widget, the Storacha console opens as an embedded iframe. But the magic happens in the authentication handshake.</p><p>Instead of creating another login, Storacha built an SSO bridge. DMAIL sends the user’s credentials via postMessage, and Storacha grants access only if the credentials are valid and authorized by the DMAIL/provider auth service. The whole process takes about 3 seconds.</p><pre>// DMAIL sends auth data to embedded Storacha console<br>parent.postMessage({<br>  type: &#39;AUTH_DATA&#39;,<br>  provider: &#39;dmail&#39;,<br>  email: user.email,<br>  userId: user.id,<br>  sessionToken: user.token<br>}, &#39;&lt;https://console.storacha.network&gt;&#39;)</pre><pre>// Storacha validates SSO token and creates UCAN delegation<br>const userDID = await validateSSOToken(ssoData)<br>const delegation = await createSpaceDelegation({<br>  issuer: serviceDID,<br>  audience: userDID,<br>  capabilities: [&#39;space/*&#39;]<br>})</pre><p>Once authenticated, users can create “Private Spaces”- essentially encrypted folders where each space gets its own RSA key pair.</p><h3>The Privacy and Encryption Architecture</h3><p>The interesting part happens when someone uploads a file. Everything is private and encrypted on the client side using symmetric keys, but managing those keys securely required some creativity.</p><p>Here’s the flow:</p><p><strong>Upload:</strong></p><ol><li>User drags a file into their private space</li><li>Browser generates a random 256-bit AES key</li><li>File gets encrypted using AES-256-CTR as it’s read, allowing massive files to be processed without loading entirely into memory using streaming encryption</li><li>The symmetric key gets sent to Storacha’s UCAN-KMS server</li><li>UCAN-KMS validates the user’s permissions and encrypts the symmetric key</li><li>Encrypted file + encrypted key metadata gets stored on IPFS</li></ol><p><strong>Download:</strong></p><ol><li>User (or someone they’ve shared space with) requests the file</li><li>Storacha validates their UCAN delegation to ensure they have access</li><li>UCAN-KMS decrypts the symmetric key</li><li>Browser receives the symmetric key and decrypts the file locally</li></ol><p>The result is military-grade encryption that feels like using Dropbox, but with mathematical guarantees that only users can access the plaintext data.</p><h3>UCANs: The Secret Sauce</h3><p>The authorization system is built on <a href="https://docs.storacha.network/concepts/ucan/">User-Controlled Authorization Networks (UCANs)</a> — think of them as decentralized permission slips that don’t require a centralized server to validate.</p><p>When Alice wants to share a file with Bob, she creates a UCAN that says “Bob can decrypt files in Alice’s Legal Documents space for the next 30 days.” Bob can use this UCAN to prove his access rights without Alice needing to be online or manage a sharing server.</p><p>The powerful part is granular permissions. Alice can give Bob access to decrypt files but not upload new ones. Or access to one space but not another. And she can revoke access instantly by marking the UCAN as revoked in the system.</p><p>She can also create delegation chains — Bob could re-delegate limited access to Carol, creating an auditable chain of permissions.</p><pre>// Alice creates delegation for Bob<br>const delegation = await createDelegation({<br>  issuer: alice.did,<br>  audience: bob.did, <br>  capabilities: [&#39;space/content/decrypt&#39;],<br>  with: &#39;did:key:alice-legal-docs-space&#39;,<br>  expiration: Math.floor(Date.now() / 1000) + (30 * 24 * 60 * 60) // 30 days<br>})</pre><pre>// Bob uses delegation to access files<br>const file = await decryptFile(cid, { <br>  delegation,<br>  proofs: [delegation] <br>})</pre><h3>The Architecture That Made It Possible</h3><p>DMAIL’s integration revealed something important about building developer-friendly infrastructure. The key was making encryption invisible to the end user while keeping it auditable for developers.</p><p>The <a href="https://github.com/storacha/ucan-kms">UCAN-KMS server</a> acts as a bridge between UCAN delegations and enterprise Key Management Services. It validates UCAN tokens and performs cryptographic operations based on the proven capabilities, without ever seeing the plaintext data.</p><p>This means:</p><ul><li>Only users can see their files</li><li>KMS never sees the UCAN tokens or user data</li><li>Each space gets its own RSA key pair, cryptographically isolated from others</li><li>All cryptographic operations are logged for audit compliance.</li><li>Every operation requires valid UCAN proofs.</li></ul><p>The modular design means DMAIL could swap between different KMS providers or even Lit Protocol without changing their client code. The <a href="https://github.com/storacha/upload-service/blob/1db10b2a5c045571b70af16302d9dc8115db8627/packages/encrypt-upload-client/src/types.ts#L79">CryptoAdapter interface</a> makes it provider-agnostic.</p><h3>Integration Patterns for Any Provider</h3><p>The iframe integration pattern built for DMAIL works for any SSO provider. Whether you’re building a productivity app, a messaging platform, or a collaboration tool, you can embed private storage in about an hour.</p><p>Storacha provides a test environment at <a href="https://console.storacha.network/test-iframe">console.storacha.network/test-iframe</a> where you can see exactly how it works. The integration requires:</p><ol><li>Embed Storacha console as an iframe</li></ol><pre>const iframe = document.createElement(&#39;iframe&#39;)<br>iframe.src = &#39;&lt;https://console.storacha.network/iframe?sso=your-provider&gt;&#39;<br>iframe.style.width = &#39;400px&#39;<br>iframe.style.height = &#39;600px&#39;<br>iframe.title = &#39;Storacha Console&#39;<br>iframe.referrerPolicy = &#39;origin&#39;<br>iframe.sandbox = &#39;allow-scripts allow-same-origin allow-forms allow-popups allow-top-navigation-by-user-activation allow-downloads&#39;<br>iframe.allow = &#39;payment&#39;<br>document.body.appendChild(iframe)</pre><p>2. Send user auth data via postMessage</p><pre>let communicationPort = null</pre><pre>window.addEventListener(&#39;message&#39;, (event) =&gt; {<br>  if (event.origin !== &#39;&lt;https://console.storacha.network&gt;&#39;) return<br>  <br>  if (event.data.type === &#39;CONSOLE_READY&#39;) {<br>    if (event.ports &amp;&amp; event.ports.length &gt; 0) {<br>      communicationPort = event.ports[0]<br>      communicationPort.onmessage = handlePortMessage<br>    }<br>  }<br>})</pre><pre>function handlePortMessage(event) {<br>  const { data } = event<br>  <br>  switch (data.type) {<br>    case &#39;LOGIN_REQUEST&#39;:<br>      const authData = {<br>        type: &#39;AUTH_DATA&#39;,<br>        authProvider: &#39;your-provider&#39;,<br>        email: &#39;user@example.com&#39;,<br>        externalUserId: &#39;user123&#39;,<br>        externalSessionToken: &#39;session-jwt-token&#39;<br>      }<br>      communicationPort.postMessage(authData)<br>      break<br>  }<br>}</pre><p>3. Handle the auth response and file operation callbacks.</p><pre>function handlePortMessage(event) {<br>  const { data } = event<br>  <br>  switch (data.type) {<br>    case &#39;LOGIN_REQUEST&#39;:<br>      // Send auth data<br>      break<br>      <br>    case &#39;LOGIN_STATUS&#39;:<br>      console.log(&#39;Auth status:&#39;, data.status)<br>      break<br>      <br>    case &#39;LOGIN_COMPLETED&#39;:<br>      if (data.status === &#39;success&#39;) {<br>        handleAuthSuccess(data)<br>      } else {<br>        handleAuthError(data.error)<br>      }<br>      break<br>  }<br>}</pre><p>That’s it. Your users get client-side encrypted private storage without you having to build a cryptography team.</p><p>Storacha handles everything — key management, encryption, UCAN delegations, file sharing, access revocation. The iframe is just the entry point for apps to start using encrypted and private decentralized data storage. Applications just need to pass user credentials and listen for authentication callbacks.</p><h3>The Bigger Picture</h3><p>What started as DMAIL needing secure file storage turned into a pattern for embedding private storage in any application. The combination of UCANs for authorization and client-side encryption for privacy creates something interesting: truly user-owned data that applications can’t access without explicit permission.</p><p>DMAIL’s users now have private storage that feels native to their workspace. But more importantly, they have granular control over who can access what, with the ability to revoke permissions instantly. All without managing a single cryptographic key.</p><p>The technical implementation is more sophisticated than what most companies would build in-house (streaming encryption, key management, delegation chains, audit logging), but the integration is simple enough that it will take just an hour to integrate into applications.</p><p>The iframe pattern means any SSO provider can offer their users encrypted private storage without hiring cryptographers, managing key infrastructure, or worrying about compliance audits. What would typically require months of cryptography work becomes an afternoon of iframe integration.</p><p><em>Want to see how this works in practice? Try out the Storacha in Dmail at</em> <a href="https://mail.dmail.ai/workspace">https://mail.dmail.ai/workspace</a> <em>or test the iframe integration at </em><a href="https://console.storacha.network/test-iframe"><em>console.storacha.network/test-iframe</em></a><em>. If you build something with these patterns, the community would love to hear about it in our </em><a href="https://discord.gg/storacha"><em>discord</em></a><em>.</em> Want to go further inside the Storacha ecosystem? Check out the curated list: <a href="https://github.com/storacha/awesome-storacha">awesome-storacha</a></p><p><em>Happy building!</em></p><h3>About Storacha</h3><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Backed by a $6.5M Seed round led by Protocol Labs Venture Studio, Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=134347180fb6" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bridging OrbitDB with Storacha: Decentralized Database Backups]]></title>
            <link>https://medium.com/@storacha/bridging-orbitdb-with-storacha-decentralized-database-backups-90aa7255d4d4?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/90aa7255d4d4</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[backup-and-restore]]></category>
            <category><![CDATA[decentralized-storage]]></category>
            <category><![CDATA[orbitdb]]></category>
            <category><![CDATA[storacha]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Wed, 03 Sep 2025 09:23:16 GMT</pubDate>
            <atom:updated>2025-12-02T11:04:50.108Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3qo0RE1Ulg161DNEtv-Mlw.png" /></figure><p><em>This guest post comes from Nico Krause, a team member exploring innovative ways to bring secure, verifiable workflows to life using Storacha.</em></p><p><em>In this write-up, they share how building an OrbitDB Storacha bridge is used to provide effortless backups and one-command restores. Read the original post </em><a href="https://medium.com/@akashjana663/bridging-orbitdb-with-storacha-decentralized-database-backups-44c7bee5c395"><em>here.</em></a></p><h3>Introduction</h3><p>In today’s decentralized ecosystem, data ownership and resilience are more important than ever. Distributed applications rely on decentralized databases like <strong>OrbitDB</strong> for peer-to-peer state management, but there’s always one big question:</p><blockquote>How do we back up and restore decentralized databases in a way that is verifiable, reliable, and developer-friendly?</blockquote><p>O<strong>rbitdb Storacha Bridge</strong> library seamlessly connects <strong>OrbitDB</strong> with <strong>Storacha </strong>a decentralized hot storage layer built on <strong>Filecoin </strong>to provide effortless backups and one-command restores. With just a few lines of code, developers can preserve their database across a decentralized storage network, ensuring permanence, verifiability, and recoverability.</p><h3>What is OrbitDB?</h3><p>OrbitDB is a <strong>serverless, distributed, peer-to-peer database</strong> built on <strong>IPFS</strong> and <strong>libp2p</strong>. Unlike traditional databases, OrbitDB doesn’t require centralized servers. Instead, it uses <strong>Merkle-CRDTs</strong> to ensure conflict-free replication across peers.</p><p>Key features of OrbitDB:</p><ul><li><strong>Decentralized</strong>: No single point of failure.</li><li><strong>Multiple data models</strong>: Key-value store, event log, documents, counters, etc.</li><li><strong>Content-addressed</strong>: Every database entry is represented by a CID (Content Identifier).</li><li><strong>Use cases</strong>: Ideal for dApps, blockchain metadata storage, local-first apps, and distributed systems.</li></ul><p>OrbitDB ensures that applications can run independently of centralized infrastructure but without backups, even decentralized systems risk losing continuity.</p><h3>OrbitDB at a Decade: A Turning Point</h3><blockquote><em>With OrbitDB turning 10 and version 3.0 unlocking stability, and with Helia/libp2p enabling browser-native nodes, we’re standing at the edge of a software architectural shift</em></blockquote><h3>What is Storacha?</h3><p>Storacha is a <strong>decentralized hot storage network</strong> designed to complement Filecoin by offering <strong>CDN-like performance</strong> with <strong>IPFS compatibility</strong>. Think of it as the high-speed “edge layer” for decentralized data.</p><p>Storacha provides:</p><ul><li><strong>Scalable, low-latency storage</strong> for real-world apps.</li><li><strong>Filecoin-backed permanence</strong> with redundancy.</li><li><strong>UCAN-based permissions</strong> (User-Controlled Authorization Networks) for secure access.</li><li><strong>Developer-first SDKs</strong> for JavaScript, Go, and CLI.</li><li><strong>High availability (99.9%)</strong> with data integrity validation.</li></ul><p>For developers, Storacha feels like using a modern cloud storage service but without centralization risks.</p><p>The goal of the <strong>orbitdb-storacha-bridge</strong> is to show how decentralized storage can power real developer workflows. OrbitDB by itself is great for peer-to-peer apps, but:</p><ul><li>Backups can be tricky to manage.</li><li>Developers want permanence and redundancy.</li><li>Restores should be fast and identity-preserving.</li></ul><p>Storacha provides the perfect fit:</p><ul><li><strong>Speed</strong>: Hot storage means fast backup and retrieval.</li><li><strong>Redundancy</strong>: Filecoin ensures data permanence.</li><li><strong>Verifiability</strong>: CIDs + Merkle proofs validate integrity.</li><li><strong>Ease of use</strong>: Simple APIs make integration seamless.</li></ul><p>In short, Storacha transforms OrbitDB from a purely peer-to-peer database into a <strong>resilient, production ready storage solution</strong>.</p><h3>Architecture &amp; Workflow</h3><p>Let’s break down how the <strong>bridge</strong> works.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/875/0*pLdPPaaiWjc_-FXp.png" /><figcaption>OrbitDB Storacha Bridge</figcaption></figure><h3>Backup Flow</h3><ol><li><strong>Extract Database Blocks<br>&gt; </strong>OrbitDB consists of multiple blocks: log entries, manifest, identity, and access control.<br>&gt; The bridge decomposes the database into these components.</li><li><strong>Upload to Storacha<br></strong>Each block is uploaded to Storacha, stored as content-addressed chunks (CIDs).</li><li><strong>Discovery &amp; Indexing<br></strong>Files are registered inside a Storacha “space” for easy listing and future restoration.</li></ol><h3>Restore Flow</h3><ol><li><strong>CID Conversion<br></strong>1<strong>. </strong>Storacha provides Filecoin/IPFS CIDs (bafkre...).<br>2. OrbitDB expects its own CID format (zdpu...).<br>3. The bridge automatically translates between the two.</li><li><strong>Reassembly<br></strong>1<strong>. </strong>The database is rehydrated from the recovered blocks.<br>2. Identity and access control metadata are preserved.</li></ol><h3>Roadmap</h3><ol><li><strong>Current Status<br></strong>The OrbitDB Storacha bridge library integrates into a local-first peer-to-peer todo app, enabling backup and restore when peers or relays become unreachable.</li><li><strong>Next Step: CustomStores<br></strong><em>Implement</em> <em>Storacha as a custom storage backend within OrbitDB</em>.<br>This means backups become implicit: every update is pushed in parallel to Storacha, enabling fresh installs of OrbitDB to sync immediately even without peer availability.</li><li><strong>Authentication Upgrade: UCAN Delegation<br></strong>Currently, the library uses Storacha Key + Proof credentials. Future contributions aim to introduce <strong>delegated UCAN-based authentication</strong>, simplifying onboarding and access flow.</li><li><strong>Hybrid SSR + PWA Mode<br></strong>Build hybrid apps using SSR frameworks (Next.js, SvelteKit, etc.) that <strong>fallback to full client-side P2P operation if servers go down</strong>. Such resilience enables apps to keep operating and replicating critical data even in infrastructural failure scenarios.</li></ol><h3>Quickstart &amp; Code Examples</h3><p>Getting started is incredibly simple.</p><h3>Install</h3><pre>npm install orbitdb-storacha-bridge</pre><h3>Backup a Database</h3><pre>import { backupDatabase } from &quot;orbitdb-storacha-bridge&quot;;<br><br>const backup = await backupDatabase(orbitdb, dbAddress, {<br>  storachaKey: process.env.STORACHA_KEY,<br>  storachaProof: process.env.STORACHA_PROOF,<br>});<br><br>console.log(`✅ Backed up ${backup.blocksUploaded} blocks`);</pre><h3>Restore a Database</h3><pre>import { restoreDatabaseFromSpace } from &quot;orbitdb-storacha-bridge&quot;;<br><br>const restore = await restoreDatabaseFromSpace(targetOrbitdb, {<br>  storachaKey: process.env.STORACHA_KEY,<br>  storachaProof: process.env.STORACHA_PROOF,<br>});<br><br>console.log(`✅ Restored ${restore.entriesRecovered} entries`);</pre><p>That’s it <strong>backup and restore in three lines of code.</strong></p><h3>Resources</h3><ol><li><strong>Source Code</strong>: <a href="https://github.com/NiKrause/orbitdb-storacha-bridge">NiKrause/orbitdb-storacha-bridge</a></li><li><strong>Relevant Docs</strong>:<br>&gt; <strong>Storacha </strong>: <a href="https://docs.storacha.network/">docs.storacha.network</a><br>&gt; <strong>OrbitDB</strong>: <a href="https://api.orbitdb.org/index.html">api.orbitdb.org</a></li><li>For <strong>Demo</strong> &amp; <strong>Tests </strong>refer <a href="https://github.com/NiKrause/orbitdb-storacha-bridge/blob/main/README.md">Readme.md</a>.</li></ol><h3>Conclusion</h3><p>The <strong>orbitdb-storacha-bridge</strong> project highlights the future of decentralized applications: databases that are <strong>resilient, verifiable, and permanently backed up</strong> all without relying on centralized servers.</p><p>With just a few lines of code, developers can:</p><ul><li>Back up OrbitDB databases into Storacha.</li><li>Restore them with integrity and identity preserved.</li><li>Confidently build apps that won’t lose critical data.</li></ul><p>If you’re building decentralized applications, this bridge is a must-try.</p><h3>Glossary</h3><ol><li><strong>Peer-to-Peer Database (P2P DB)<br></strong>A database that does not rely on a central server. Instead, every participant (peer) maintains a copy of the database and synchronizes directly with others. In OrbitDB, peers exchange changes over IPFS/libp2p, meaning the app can continue working even if some peers or servers go offline.</li><li><strong>OrbitDB<br></strong>A distributed, peer-to-peer database built on top of IPFS. It supports multiple store types (key-value, log, documents, counters) and works in both Node.js and modern browsers.</li><li><strong>IPFS (InterPlanetary File System)<br></strong>A decentralized protocol for storing and sharing files using content addressing (files are identified by their hash, called a CID). OrbitDB uses IPFS for storage and transport.</li><li><strong>CID (Content Identifier)<br></strong>A unique, cryptographic hash that identifies content in IPFS. Instead of referring to “where” a file is stored (like a URL), a CID identifies “what” the file is.</li><li><strong>Libp2p</strong><br>A modular peer-to-peer networking stack used by IPFS and OrbitDB. It enables peer discovery, transport (WebRTC, TCP, WebSockets), encryption, and messaging.</li><li><strong>Helia</strong><br>The modern successor to js-libp2p, designed for IPFS in browsers. It enables lightweight peer-to-peer nodes to run client-side, letting users spin up IPFS + OrbitDB instances directly in their browser.</li><li><strong>Manifest</strong><br>Metadata that defines how an OrbitDB database is created and identified. It includes the database type, access controller, and other configuration details.</li><li><strong>Identity</strong><br>OrbitDB uses cryptographic identities (public/private key pairs) to sign and verify database entries. This ensures only authorized peers can write to a database.</li><li><strong>Access Controller</strong><br>The component in OrbitDB that defines who can write (or replicate) to the database. Common controllers include IPFSAccessController or custom implementations.</li><li><strong>Blocks</strong><br>The smallest unit of content in IPFS. Files and database entries are broken into blocks, each identified by its own CID. Storacha backs up OrbitDB by storing these blocks.</li><li><strong>Storacha</strong><br>A decentralized, Filecoin-backed storage layer designed to be UCAN-native and backend-less. It provides primitives like <strong>spaces</strong>, <strong>proofs</strong>, and <strong>delegations</strong> for secure and composable storage.</li><li><strong>UCAN (User Controlled Authorization Networks)</strong><br>A cryptographic, delegation-based authorization system. Instead of centralized API keys, UCANs allow users to delegate permissions securely and verifiably. Planned for future integration in OrbitDB–Storacha bridge.</li><li><strong>CustomStores (OrbitDB)<br></strong>OrbitDB supports defining custom storage backends. In the future, Storacha could be plugged in directly as a CustomStore so backups happen implicitly with every write.</li><li><strong>Hybrid Applications (SSR + P2P)<br></strong>Apps that combine <strong>server-side rendering (SSR)</strong> frameworks (like Next.js or SvelteKit) with <strong>local-first peer-to-peer</strong> replication. Even if the SSR server fails, the client-side app (as a PWA) continues to run and sync via OrbitDB + IPFS + Storacha.</li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=90aa7255d4d4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Storacha x Parasail: Trustless Infrastructure Meets Blazing-Fast Storage]]></title>
            <link>https://medium.com/@storacha/storacha-x-parasail-trustless-infrastructure-meets-blazing-fast-storage-10c57156ead8?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/10c57156ead8</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[decentralized-data]]></category>
            <category><![CDATA[decentralized-storage]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[web3-infrastructure]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Fri, 29 Aug 2025 01:44:24 GMT</pubDate>
            <atom:updated>2025-08-29T01:44:24.668Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*1TRbdChxRyWPDPN4Rccauw.png" /></figure><p>At Storacha, we’re building the backbone for a decentralized future powered by fast, portable, and programmable data. Today, we’re thrilled to announce a strategic partnership with <a href="https://www.parasail.network">Parasail</a>, a protocol that will help you earn a share of next generation infrastructure through real-world utility staking and curated deal access. This collaboration marks the beginning of a long-term alignment between two foundational pieces of the web3 infrastructure stack. While there’s no code-level integration today, we share a common vision for scalable, verifiable, and performant decentralized systems — and we’re just getting started.</p><h4><strong>About Parasail: Own a Share of the Next Generation Infrastructure</strong></h4><p>Parasail is building the trust engine for the next generation infrastructure. It connects strategic capital with real on-chain infrastructure, giving investors and contributors a way to earn from decentralized networks without operating hardware.</p><p>This means that protocols can finally rely on trustless accountability: staked guarantees that services like compute, bandwidth, or hardware performance will actually be delivered. It also paves a possible way to earn yield from decentralized infrastructures by allocating capital strategically, without needing scale or hardware ops.</p><h4><strong>Why This Partnership Makes Sense</strong></h4><p>While Storacha focuses on blazing-fast hot storage on IPFS and Filecoin, Parasail tackles the trust layer, ensuring those offering infrastructure services are held to their promises. Together, we represent two sides of the same coin:</p><ul><li>Storacha enables performant, programmable data access</li><li>Parasail ensures those services are reliably delivered and earnings are utility based and real without operating hardware</li></ul><p>This is a strategic alignment based on shared values, not a technical integration (yet). But it sets the stage for future collaboration across co-marketing, ecosystem education, and potential touchpoints in decentralized service provisioning.</p><h4><strong>Looking Ahead: Building the Future of Infra, Together</strong></h4><p>As we continue to grow the Storacha network, we’re proud to align with protocols like Parasail who share our commitment to high-integrity, high-performance decentralized infrastructure.</p><p>Here’s what to expect next:</p><ul><li>Co-branded content drops across X and Discord</li><li>Ecosystem storytelling around programmable data + verifiable trust</li><li>Continued exploration of how SLA-backed incentives can strengthen the storage stack</li></ul><p>This is just the beginning. Storacha and Parasail are aligned on one simple truth: the decentralized web will not scale without performance and trust. Together, we are working to make both accessible.</p><h4>About Storacha</h4><p>Storacha is building the foundation for a decentralized internet based on verifiable, self-sovereign data. Storacha enables portable, programmable private data at scale through DIDs and UCANs — a breakthrough in decentralized access control. Its infrastructure powers entirely new possibilities: from AI agents securely sharing data, to games and dApps exchanging off-chain assets without relying on servers or middlemen. Storacha’s vision is simple: your house, your key.</p><h4>About Parasail</h4><p>Parasail creates simple, efficient ways for anyone to earn from next-generation infrastructure: from GPU networks and data centers to CDNs and power grids. Built fully on-chain and integrated with DeFi, Parasail maximizes both utility and liquidity.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=10c57156ead8" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DocumentSigner: Tracking System using Storacha, UCANs and IPNS]]></title>
            <link>https://medium.com/@storacha/documentsigner-tracking-system-using-storacha-ucans-and-ipns-0d242190a797?source=rss-d5242a9bcad1------2</link>
            <guid isPermaLink="false">https://medium.com/p/0d242190a797</guid>
            <category><![CDATA[hot-storage]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[web3-apps]]></category>
            <category><![CDATA[decentralized-storage]]></category>
            <dc:creator><![CDATA[Storacha]]></dc:creator>
            <pubDate>Thu, 28 Aug 2025 16:29:48 GMT</pubDate>
            <atom:updated>2025-08-28T16:29:48.727Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Q1ZLdX_Uv1vyWD-pd-O_pQ.png" /></figure><p><em>This guest post comes from Akash, along with fellow builders Dhruv, Gulshan, and Devansh, a team exploring innovative ways to bring secure, verifiable workflows to life using Storacha. In this write-up, they share how they built a DocumentSigner tracking system powered by UCANs and IPNS, enabling tamper-proof, decentralized document verification. Read the original post </em><a href="/@akashjana663/docusign-%EF%B8%8F-tracking-system-using-storacha-ucans-and-ipns-13cc59fabcce"><em>here</em></a><em>.</em></p><h3>Introduction</h3><p>In an era where decentralized technologies are gaining traction, the need for seamless, server-independent document workflows is rising. Enter <strong>DocumentSigner on Storacha</strong> a proof-of-concept system built atop Storacha, IPFS/IPNS, and UCANs that enables secure PDF signing and signer tracking <strong>without any backend infrastructure</strong>.</p><h3>What is DocumentSigner?</h3><p>DocumentSigner is a decentralized document signing application built using Storacha. It allows organizations, employees, contractors, or freelancers each identified by a DID to securely sign agreements. Permissions and access are granted via UCAN delegations, and the entire signing workflow is facilitated through decentralized storage and linking, eliminating reliance on centralized servers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/875/0*f6-PUKR9B6iCsZdc.png" /></figure><h3>Architecture and Workflow</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*tRyjzYYl7wo4YoN1.png" /></figure><ol><li><strong>Upload &amp; Initial Setup: <br>&gt; </strong>The PDF agreement is uploaded to Storacha as a directory, returning an IPFS CID.<br>&gt; A UCAN delegation is created for each signer with embedded metadata DID, signing window (notBefore, expiration), and the file’s CID.</li><li><strong>IPNS for Tracking State<br>&gt; </strong>An IPNS key is generated (and stored in localStorage) to manage a mutable pointer to the current version of the document.</li><li><strong>Signing Process<br>&gt; </strong>Signers use their UCAN to open, sign, and submit updates. After signing, a new directory (containing signed.pdf, original agreement.pdf, and delegations.json) is uploaded, yielding a new CID. &gt; The IPNS name is then updated to point to this latest CID, effectively tracking document evolution.</li><li><strong>State Resolution &amp; Comparison<br>&gt; </strong>To check who has signed, the system resolves the IPNS name using https://name.web3.storage/name/&lt;ipnsName&gt; (preferred over cached resolution).<br>&gt; It fetches and parses embedded JSON from the PDFs (delegations.pdfand signed.pdf), allowing comparison of pending vs completed signatures all without a backend.</li></ol><h3>Why Storacha, UCANs and IPNS?</h3><p>Storacha is used as the <strong>decentralized storage backbone</strong> for this DocumentSigner demo because it provides all the primitives required to make the signing flow completely backend-less:</p><ul><li><strong>CID Generation</strong> : Every uploaded file gets a unique, immutable <strong>Content Identifier (CID)</strong> via IPFS.</li><li><strong>Space-based Uploads: </strong>Files are uploaded directly to a <strong>user’s storage space</strong> without relying on central servers.</li><li><strong>UCAN Embedding</strong> : UCAN (User Controlled Authorization Networks) tokens can be generated and embedded to delegate granular, time-bound permissions to specific signers.</li><li><strong>No Centralized Backend</strong> : All logic and data storage happen client-side or on decentralized infrastructure, removing the need for traditional servers.</li></ul><p>This architecture is complemented by:</p><ul><li><strong>IPFS (InterPlanetary File System)</strong>: Content-addressed storage for PDFs, ensuring immutability and verifiability.</li><li><strong>IPNS (InterPlanetary Name System): </strong>Mutable pointers that can update to reference the latest signed document version while keeping a permanent reference name.</li><li><strong>UCANs</strong> : Decentralized authorization tokens defining <em>who</em> can sign, <em>what</em>they can sign, and <em>when</em>.</li><li><strong>DIDs (Decentralized Identifiers): </strong>Unique identities for organizations, employees, or contractors participating in the signing flow.</li><li><strong>w3name: </strong>Library for generating and updating IPNS names and keys directly in the browser.</li></ul><p>Together, these technologies make it possible to:</p><ul><li>Store agreements securely on decentralized storage.</li><li>Delegate signing permissions without a central authority.</li><li>Track document signing status in <strong>real-time</strong> via IPNS updates.</li><li>Maintain complete transparency and version history of signed documents.</li></ul><p>This combination of <strong>Storacha, IPFS, IPNS, UCANs and DIDs</strong> demonstrates how modern Web3 tools can power practical, secure, and <strong>self-contained document workflows</strong> without a backend.</p><h3>Resources</h3><ol><li><strong>Source code</strong>: <a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha">Github</a> (Contributor: <a href="https://github.com/gulshanpr">Gulshan</a>)</li><li><strong>Storacha UCANs</strong>: <a href="https://github.com/storacha/ucanto">storacha/ucanto</a></li><li><strong>Storacha Docs</strong>: <a href="https://docs.storacha.network/">docs.storacha.network</a></li><li><strong>Implementation Blog: </strong><a href="/@gulshanpr/tracking-system-using-storacha-ucans-and-ipns-f4a7566dbad7">Tracking System</a></li><li><strong>DocumentSigner Docs</strong>:<br>📂 <a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/tree/main/docusign/docs">docusign/docs</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/IPNSManagement.md">IPNS Management</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/UCANGeneration.md">UCAN Generation</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/decodeUCAN.md">Decode UCAN</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/fileUpload.md">File Upload</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/signature.md">Signature</a><br>📄<a href="https://github.com/Dhruv-Varshney-developer/Docusign-storacha/blob/main/docusign/docs/track.md">Track</a></li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=0d242190a797" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>