Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      tRPC vs GraphQL vs REST: Choosing the right API design for modern web applications

      June 26, 2025

      Jakarta EE 11 Platform launches with modernized Test Compatibility Kit framework

      June 26, 2025

      Can Good UX Protect Older Users From Digital Scams?

      June 25, 2025

      Warp 2.0 evolves terminal experience into an Agentic Development Environment

      June 25, 2025

      Microsoft Copilot secures a spot in classrooms as a “thought partner” — with Copilot Chat backed by OpenAI’s GPT-4o

      June 26, 2025

      OpenAI started as a “countervailing force” to Google — did Elon Musk and Sam Altman torpedo DeepMind’s plans to dictate AGI?

      June 26, 2025

      Gears of War: Reloaded preorders — where to buy and everything you need to know

      June 26, 2025

      OpenAI’s Sam Altman breaks silence on Microsoft feud with Satya Nadella — citing “points of tension” amid evolution plans

      June 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Are Semantic Layers Sexy Again? or The Rise and Fall and Rise of Semantic Layers

      June 26, 2025
      Recent

      Are Semantic Layers Sexy Again? or The Rise and Fall and Rise of Semantic Layers

      June 26, 2025

      Salesforce Marketing Cloud Engagement vs. Oracle Eloqua

      June 26, 2025

      Exploring Lucidworks Fusion and Coveo Using Apache Solr

      June 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Copilot secures a spot in classrooms as a “thought partner” — with Copilot Chat backed by OpenAI’s GPT-4o

      June 26, 2025
      Recent

      Microsoft Copilot secures a spot in classrooms as a “thought partner” — with Copilot Chat backed by OpenAI’s GPT-4o

      June 26, 2025

      OpenAI started as a “countervailing force” to Google — did Elon Musk and Sam Altman torpedo DeepMind’s plans to dictate AGI?

      June 26, 2025

      Gears of War: Reloaded preorders — where to buy and everything you need to know

      June 26, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Operating Systems»Linux»Internxt – Zero-knowledge, secure Cloud storage with Linux Client

    Internxt – Zero-knowledge, secure Cloud storage with Linux Client

    September 2, 2024

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    With the growing concerns about data breaches and unauthorized access and major cloud storage providers increasing cost and reducing transparency, it’s difficult to find a cloud storage service that prioritizes user privacy.

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    Today I will share with you the cloud storage service that deserves a try if you’re looking for a better alternative, it’s Internxt.

    Internxt, a relatively new player in the cloud storage market, has quickly gained attention due to its robust security features and user-centric approach.

    Zero-Knowledge AES-256 Encryption

    One of the standout features I like of Internxt is its zero-knowledge AES-256 encryption.

    But what does zero-knowledge really mean?

    Internxt’s zero-knowledge policy ensures that no one, not even Internxt, can access or read your files, photos, or any other data stored on their servers. This encryption method is designed so that only the user, with their unique password can decrypt their data.

    AES-256 encryption is one of the most secure encryption methods available that makes it virtually impossible for unauthorized users to access your information. This means that even if a third party were to intercept your data, they wouldn’t be able to make sense of it without the encryption key.

    End-to-End Encryption

    As mentioned above, Internxt takes data security a step further with end-to-end encryption. This means that from the moment your data leaves your device until it reaches Internxt’s servers, it remains encrypted and protected.

    The data is only decrypted when you access it again, and it ensures that it is safe from potential cyber threats or breaches during transmission.

    Unique User Passwords

    Internxt doesn’t store user passwords which adds an extra layer of security.

    When you set up your Internxt account, your password is used to encrypt and decrypt your data. Since Internxt doesn’t store your password, even the company cannot access your files.

    If you ever need to change your password, you can do so directly from the Internxt app. However, it’s important to remember that since the password is crucial for encryption forgetting it might result in losing access to your data.

    So I highly recommend you securely save your password somewhere, maybe a password manager.

    Open Source and Independent Audits

    If you’ve been a long-time reader of Linux And Beyond, you probably already know how much I love to use open-source applications. Open-source applications are much more secure and privacy-friendly than close-source applications where we don’t know what’s happening.

    Internxt source code is publicly available, it means anyone can access its code, read it, see how it works, and even contribute to the development of the software.

    Open-source platforms often have a higher level of trust among users because they can independently verify the claims made by the company.

    To further improve its credibility, Internxt has been independently audited and verified by Securitum, one of Europe’s leading penetration testing companies. This audit ensures that Internxt’s security protocols are robust and can withstand attempts to breach them.

    Two-Factor Authentication (2FA)

    Let’s say someone gains access to your password. Setting up 2FA prevents people from gaining access to your data even when they’ve your password.

    With 2FA enabled users must provide a second form of verification, such as a code sent to their mobile device, in addition to their password.

    Flexible Storage Options

    Internxt offers flexible storage plans to cater to a wide range of users. Whether you’re an individual needing a modest amount of storage or a business requiring extensive space, Internxt has you covered.

    Their plans go up to 10TB to ensure that users never have to worry about running out of space.

    This scalability makes Internxt suitable for various needs, from storing personal photos and documents to backing up large volumes of corporate data.

    Cross-Platform Support

    Most major cloud providers don’t provide a native client for their cloud storage and that puts us in the weird spot where we have to use unofficially developed.

    One big advantage I have as a Linux user is that Internxt has a native client for Linux.

    I have been using their Linux client without any hassle. Initially, there were a few issues syncing large files from the desktop, and I reported the issue to the company. And they fixed it 😄!

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client
    Internxt - Zero-knowledge, secure Cloud storage with Linux Client
    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    Internxt also has official clients available for all major operating systems, including Windows, macOS, Android, and iOS.

    Try Internxt on Linux

    Conclusion

    Internxt is not just another cloud storage service; it’s a commitment to user privacy and security.

    If you’re looking to upgrade your cloud storage to a company that aligns with the open-source industry standards, is privacy-centric, and is user-friendly, I encourage you to give Internxt a try.

    With its zero-knowledge AES-256 encryption, end-to-end encryption, and unique user password policies, it ensures that your data remains yours and yours alone.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleObsidian: Best Open Source AI-powered Note-taking App
    Next Article Learning Through Play – CulinarySchools.org’s Educational Games

    Related Posts

    News & Updates

    Microsoft Copilot secures a spot in classrooms as a “thought partner” — with Copilot Chat backed by OpenAI’s GPT-4o

    June 26, 2025
    News & Updates

    OpenAI started as a “countervailing force” to Google — did Elon Musk and Sam Altman torpedo DeepMind’s plans to dictate AGI?

    June 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2024-52561 – Parallels Desktop for Mac Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    I recommend this Chromebook over many Windows laptops that cost twice as much

    News & Updates

    Microsoft’s Windows 365 Link mini PC is now available — full specs and pricing revealed

    News & Updates

    Windows 11 KB5055627 24H2 fixes BSODs, direct download .msu

    Operating Systems

    Highlights

    Development

    How to Split Data with Newline Characters into Separate Rows in Excel Using Power Query

    April 3, 2025

    When working with datasets in Excel, you might encounter situations where multiple values are stored…

    Wifite is a Python script for auditing wireless networks

    June 10, 2025

    CVE-2025-3200 – “Com-Server TLS Protocol Downgrade Vulnerability”

    April 28, 2025

    CVE-2025-5670 – PHPGurukul Medical Card Generation System SQL Injection

    June 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.