Frayja Vault Features

Version Control

  • Version a file or directory to create a snapshot change list of finger-printed and timestamped files.
  • Create a snapshot of the directory or file by checking it into the version control system.
  • Create a list of fingerprinted and timestamped files by running a diff command on the version change list.
  • Store the list of fingerprinted and timestamped files in the transaction change log for future reference.

Simple

  • On-demand workflow to upload encrypted files to IPFS, stop and restart the upload from where it stopped.
  • Generate a unique encryption file with the public key.
  • Upload the encrypted file to IPFS.
  • Make note of the IPFS file hash.
  • Store the encryption key along with the IPFS file hash in a secure change list on your computer.
  • Use the change list file to stop and restart the upload from where it left off.e.g

Unintrusive

  • Unintrusive No need to create a sync folder the application will work with your existing directory structure.
  • Secure All the data is transferred over a secure channel (https)
  • Multiplatform Works on Windows, Mac, and Linux.
  • Easy to use The application works in the background without requiring user interaction.
  • Fast and reliable The application is fast and reliable and uses advanced algorithms to ensure that your data is always up to date. Affordable The application is affordable and comes with a free trial period.

Cherry Pick

  • Filter the files that you need to be uploaded to IPFS by type, size or directory path.
  • The Cherry Pick Filter is a feature that allows users to easily filter through their files and select only the files that they need for uploading. The filter can be used to filter files by type, size, or directory path. This allows users to quickly find the files that they need for a specific purpose, without having to manually search through their entire file system. The Cherry Pick Filter also allows users to quickly identify which files are out of date or missing, making it easier to keep their files up to date.

Retention

  • Delete the file locally and recover from IPFS as needed.
  • When it comes to retention, the best practice is to delete the file locally and recover from IPFS as needed. This ensures that the file is stored securely and can be accessed whenever needed without taking up too much space on the local device. Additionally, IPFS provides a way to track and store encryption keys, making it a reliable solution for storing data securely.

Compliance

  • Keep a timeline of changed files uploaded to IPFS.
  • IPFS is designed with a cryptographic approach to ensure compliance with data and content integrity. The IPFS protocol uses cryptographic hashes to ensure the integrity of the content stored on the network. To ensure compliance, a timeline of every changed file uploaded to IPFS. This timeline can be used to trace the history of a file, including when it was created, modified, or deleted. This allows you to track changes to the data over time and ensure compliance with any applicable