
Don't trust, verify.
Data integrity proven by cryptography, not promised by vendors.
- Protocol-enforced immutability — no admin override
- Cryptographic proof that stored data hasn't been altered
- Independent verification — no vendor contact required
What Makes It Secure
Built on the Arweave protocol — a decentralized permanent storage network operational since 2018 with zero data loss — ar.io provides security properties that are structural, not policy-based.
Protocol-Enforced Immutability
No admin override, no vendor override, no single point of deletion. Immutability is a structural property of the protocol — not a policy setting.
Cryptographic Integrity & Provenance
Merkle tree verification ensures any tampering is mathematically detectable. Permanent, tamper-proof records of who created what and when, architecturally aligned with C2PA content authenticity standards.
Client-Side Encryption
AES-256-GCM encryption before data leaves your environment. You manage all keys. No vendor access to plaintext — ever.
Decentralized Redundancy
Hundreds of replicas across dozens of countries. Self-healing replication via economic incentives. 7+ years zero data loss.
Independent Verification
Any auditor, regulator, or third party can verify data integrity with only a transaction ID. No vendor contact required.
Open Source
All code is open source on GitHub and fully self-hostable. Zero vendor dependency if you choose sovereign deployment.
How Verification Works
No vendor contact, API keys or subscriptions. Just math.
Store
Upload through ar.io and receive a transaction ID
Retrieve
Fetch from any gateway worldwide
Recompute
Compute the Merkle data root
Compare
Check against on-chain root
Proof
Byte-for-byte identical. Mathematical proof.
Store
Upload data through ar.io. Receive a transaction ID — your permanent cryptographic receipt.
Retrieve
Fetch your data from any ar.io gateway worldwide — or from your own self-hosted gateway.
Recompute
Compute the Merkle data root from the retrieved data using the open-source algorithm.
Compare
Check the computed root against the on-chain root in the transaction header on Arweave.
Verified
If roots match, the data is byte-for-byte identical to the original. Mathematical proof, not a vendor promise.
Compliance
We use the term “architecturally aligned” — not “certified compliant.” Here's our honest status.
Where We Align
- SEC 17a-4 (WORM)
Protocol-enforced write-once storage meets WORM technical requirements
- SOX / FINRA
Immutable, independently auditable records with tamper-proof timestamps
- GDPR
Crypto-shredding + gateway content moderation; consult legal counsel
Not Currently Supported
- SOC 2 Type II
- ISO 27001
- HIPAA BAA
- FedRAMP
What we offer instead of certifications
Cryptographic proof. Any auditor, regulator, or third party can independently verify data integrity using only a transaction ID — no vendor involvement, no NDA, no trust required. We believe verifiable security is stronger than audited security.
Transparency
Security through openness, not obscurity.
What We Do
- All code is open source ( github.com/ar-io)
- Observation reports stored permanently on Arweave
- All network state publicly verifiable on-chain
- Economic model and endowment fund publicly documented
- Full security architecture document available upon request
What We Don't Do
- No server-side encryption — you control all encryption
- No data deletion — by design; crypto-shredding available
- No data residency controls — global replication by design
- No vendor access to your plaintext data
- No recurring fees that could lapse and put data at risk
Common Questions
Do you have SOC 2?
How is data encrypted?
Can data be deleted?
What if I accidentally upload unencrypted data?
How do I verify data integrity?
What happens if ar.io shuts down?
How is this different from a traditional backup vault?
How does ar.io relate to content provenance standards like C2PA?
Where is data stored?
Verify it yourself
Upload test data, get a transaction ID, and independently confirm integrity from any gateway. Or talk to our team about your security requirements.