Understanding end-to-end encryption with JT Olio



Join the Community — https://forum.storj.io
Get started with Tardigrade platform (Developers) — https://tardigrade.io/satellites/
Run your own storage node — https://storj.io/sign-up-node-operator/

Its Tardigrade Thursday, and Im Jocelyn Matthews, Community Manager at Storj Labs. Storj Labs powers Tardigrade, our enterprise level decentralized cloud object storage platform. We push out technical content on a weekly basis to to shine a light on technical conversations and tutorials the we think you’ll like.

Today Im talking with JT Olio about Encryption. Our conversation is timely because of recent shifts to larger numbers of people working from home.

The public consciousness around data security is therefore high, as many people are looking to find what they need to know about encryption, how it applies to them personally, and what are some best practices to be aware of as developers.

Before we hop in, just a little context to ground the conversation: JT is the Vice President of Engineering here at Storj Labs, and has overseen the team working on Tardigrade to its current state. From its prior iterations written in nodeJS to a complete refactoring and makeover in Go.

JT’s had a long career in this space, and his previous work at Space Monkey and Mozy (one of the original cloud-based backup companies) has gaven him deep experience working with distributed hash tables, cryptography, Reed-Solomon erasure codes, NAT traversal, fairness mechanics, game theory. Along with security, FUSE, embedded Linux, deployment and packaging, user and inventory management.

Because of this particular path, JT has fostered a team ethos that is very much slanted toward encryption and security by default.

/**********************************
Please like share and subscribe
***********************************/
Jocelyn Matthews and JT Olio discuss how encryption works on the Tardigrade system for decentralized cloud object storage. Learn why encryption should be baked in at the architecture stage, why the harsh conditions of decentralization create better security, and ponder ideas about what the current climate is already affecting attitudes around the value of security and encryption.

source