Storj Blog

Data centralization behind corporate firewalls has long been the canonical pattern of how enterprises manage and store information. Unfortunately, this type of system architecture has some well documented security shortcomings. With recent technological advances, hackers are better equipped to breach company private firewalls. However, companies struggle to keep pace and adapt their data infrastructure to an architecture that makes it arduous for hackers to obtain data.  

Read More →

How To DDoS Yourself



We’ve been dealing with some backend issues recently. Something has been making our Bridge servers hang, which caused even simple requests to time out. This impacted everything from user registration to file retrievals. These time outs manifested as “502 - Bad Gateway” errors from our API as the servers accepted connections, and then failed to do anything with them. We spent a lot of time and effort tracking down the root of the issue. Turns out one overlooked variable assignment caused it all.

Read More →

Submit your Ideas



Dear Supporters, The Storj team is pleased with the progress of our ongoing Test Group C and the rhythm at which we release new software updates for Storj’s range of applications. We are also overwhelmed with the response and support received by the community and developers who have already started testing our platforms as well as building apps for it. We are also intrigued by the amount of ideas that our supporters and community at large come up and present us with.
Read More →