Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 14, 2025

      This week in AI dev tools: Apple’s Foundations Model framework, Mistral’s first reasoning model, and more (June 13, 2025)

      June 13, 2025

      Open Talent platforms emerging to match skilled workers to needs, study finds

      June 13, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      6 registry tweaks every tech-savvy user must apply on Windows 11

      June 14, 2025

      Here’s why network infrastructure is vital to maximizing your company’s AI adoption

      June 14, 2025

      The AI video tool behind the most viral social trends right now

      June 14, 2025

      Got a new password manager? How to clean up the password mess you left in the cloud

      June 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025
      Recent

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025

      Tunnel Run game in 170 lines of pure JS

      June 14, 2025

      Integrating Drupal with Salesforce SSO via SAML and Dynamic User Sync

      June 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 24H2 tests toggle to turn off Recommended feed in the Start menu

      June 14, 2025
      Recent

      Windows 11 24H2 tests toggle to turn off Recommended feed in the Start menu

      June 14, 2025

      User calls Windows 11 “pure horror,” Microsoft says it’s listening to feedback

      June 14, 2025

      John the Ripper is an advanced offline password cracker

      June 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Operating Systems»Linux»Internxt – Zero-knowledge, secure Cloud storage with Linux Client

    Internxt – Zero-knowledge, secure Cloud storage with Linux Client

    September 2, 2024

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    With the growing concerns about data breaches and unauthorized access and major cloud storage providers increasing cost and reducing transparency, it’s difficult to find a cloud storage service that prioritizes user privacy.

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    Today I will share with you the cloud storage service that deserves a try if you’re looking for a better alternative, it’s Internxt.

    Internxt, a relatively new player in the cloud storage market, has quickly gained attention due to its robust security features and user-centric approach.

    Zero-Knowledge AES-256 Encryption

    One of the standout features I like of Internxt is its zero-knowledge AES-256 encryption.

    But what does zero-knowledge really mean?

    Internxt’s zero-knowledge policy ensures that no one, not even Internxt, can access or read your files, photos, or any other data stored on their servers. This encryption method is designed so that only the user, with their unique password can decrypt their data.

    AES-256 encryption is one of the most secure encryption methods available that makes it virtually impossible for unauthorized users to access your information. This means that even if a third party were to intercept your data, they wouldn’t be able to make sense of it without the encryption key.

    End-to-End Encryption

    As mentioned above, Internxt takes data security a step further with end-to-end encryption. This means that from the moment your data leaves your device until it reaches Internxt’s servers, it remains encrypted and protected.

    The data is only decrypted when you access it again, and it ensures that it is safe from potential cyber threats or breaches during transmission.

    Unique User Passwords

    Internxt doesn’t store user passwords which adds an extra layer of security.

    When you set up your Internxt account, your password is used to encrypt and decrypt your data. Since Internxt doesn’t store your password, even the company cannot access your files.

    If you ever need to change your password, you can do so directly from the Internxt app. However, it’s important to remember that since the password is crucial for encryption forgetting it might result in losing access to your data.

    So I highly recommend you securely save your password somewhere, maybe a password manager.

    Open Source and Independent Audits

    If you’ve been a long-time reader of Linux And Beyond, you probably already know how much I love to use open-source applications. Open-source applications are much more secure and privacy-friendly than close-source applications where we don’t know what’s happening.

    Internxt source code is publicly available, it means anyone can access its code, read it, see how it works, and even contribute to the development of the software.

    Open-source platforms often have a higher level of trust among users because they can independently verify the claims made by the company.

    To further improve its credibility, Internxt has been independently audited and verified by Securitum, one of Europe’s leading penetration testing companies. This audit ensures that Internxt’s security protocols are robust and can withstand attempts to breach them.

    Two-Factor Authentication (2FA)

    Let’s say someone gains access to your password. Setting up 2FA prevents people from gaining access to your data even when they’ve your password.

    With 2FA enabled users must provide a second form of verification, such as a code sent to their mobile device, in addition to their password.

    Flexible Storage Options

    Internxt offers flexible storage plans to cater to a wide range of users. Whether you’re an individual needing a modest amount of storage or a business requiring extensive space, Internxt has you covered.

    Their plans go up to 10TB to ensure that users never have to worry about running out of space.

    This scalability makes Internxt suitable for various needs, from storing personal photos and documents to backing up large volumes of corporate data.

    Cross-Platform Support

    Most major cloud providers don’t provide a native client for their cloud storage and that puts us in the weird spot where we have to use unofficially developed.

    One big advantage I have as a Linux user is that Internxt has a native client for Linux.

    I have been using their Linux client without any hassle. Initially, there were a few issues syncing large files from the desktop, and I reported the issue to the company. And they fixed it 😄!

    Internxt - Zero-knowledge, secure Cloud storage with Linux Client
    Internxt - Zero-knowledge, secure Cloud storage with Linux Client
    Internxt - Zero-knowledge, secure Cloud storage with Linux Client

    Internxt also has official clients available for all major operating systems, including Windows, macOS, Android, and iOS.

    Try Internxt on Linux

    Conclusion

    Internxt is not just another cloud storage service; it’s a commitment to user privacy and security.

    If you’re looking to upgrade your cloud storage to a company that aligns with the open-source industry standards, is privacy-centric, and is user-friendly, I encourage you to give Internxt a try.

    With its zero-knowledge AES-256 encryption, end-to-end encryption, and unique user password policies, it ensures that your data remains yours and yours alone.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleObsidian: Best Open Source AI-powered Note-taking App
    Next Article Learning Through Play – CulinarySchools.org’s Educational Games

    Related Posts

    Operating Systems

    Windows 11 24H2 tests toggle to turn off Recommended feed in the Start menu

    June 14, 2025
    Operating Systems

    User calls Windows 11 “pure horror,” Microsoft says it’s listening to feedback

    June 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Linus Torvalds: Rivoluzionario per Caso Dal Commodore VIC-20 a Linux

    Linux

    Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

    Development

    CVE-2025-40555 – APOGEE PXC+TALON TC Series BACnet Broadcast Storm Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    What Is Q in Django? (And Why It’s Super Useful)

    Development

    Highlights

    CVE-2025-48241 – Verge3D Cross-site Scripting (XSS)

    May 23, 2025

    CVE ID : CVE-2025-48241

    Published : May 23, 2025, 1:15 p.m. | 1 hour, 37 minutes ago

    Description : Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Soft8Soft LLC Verge3D allows Reflected XSS. This issue affects Verge3D: from n/a through 4.9.3.

    Severity: 7.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Rilasciata Mabox Linux 25.04: aggiornamento mensile della distribuzione Arch-based con Openbox personalizzato

    May 1, 2025

    CVE-2025-4231 – Palo Alto Networks PAN-OS Command Injection Vulnerability

    June 12, 2025

    I tested Samsung’s ultra-thin Galaxy S25 model – it’s a worthy iPhone 17 Air rival

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.