ar.io
Trust Center

Don't trust, verify.

Data integrity proven by cryptography, not promised by vendors.

  • Protocol-enforced immutability with no admin override
  • Cryptographic proof that stored data hasn't been altered
  • Independent verification without vendor contact

What Makes It Secure

Built on the Arweave protocol, a decentralized permanent storage network operational since 2018 with zero data loss. Ar.io provides security properties that are structural, not policy-based.

Protocol-Enforced Immutability

No admin override, no vendor override, no single point of deletion. Immutability is a structural property of the protocol.

Cryptographic Integrity & Provenance

Merkle tree verification ensures any tampering is mathematically detectable. Permanent, verifiable records of who created what and when, architecturally aligned with C2PA content authenticity standards.

Client-Side Encryption

AES-256-GCM encryption before data leaves your environment. You manage all keys.

Decentralized Redundancy

Hundreds of replicas across dozens of countries. Self-healing replication via economic incentives. 7+ years zero data loss.

Independent Verification

Any auditor, regulator, or third party can verify data integrity with only a transaction ID. No vendor contact required.

Open Source

All code is open source on GitHub and fully self-hostable. Zero vendor dependency if you choose sovereign deployment.

How Verification Works

No vendor contact, API keys or subscriptions. Just math.

Store

Upload data through ar.io. Receive a transaction ID, your permanent cryptographic receipt.

Retrieve

Fetch your data from any ar.io gateway worldwide or from your own self-hosted gateway.

Recompute

Compute the Merkle data root from the retrieved data using the open-source algorithm.

Compare

Check the computed root against the on-chain root in the transaction header on Arweave.

Verified

If roots match, the data is byte-for-byte identical to the original. Mathematical proof, not a vendor promise.

Compliance

Ar.io supports regulated recordkeeping through immutable storage, tamper-evident timestamps, and independent verification. Here’s what the network enables today.

Recordkeeping & auditability

  • WORM-oriented retention (SEC 17a-4 workflows)

    Protocol-enforced immutability supports WORM-style recordkeeping and supervision workflows.

  • Audit trails (SOX / FINRA)

    Immutable, independently verifiable records with tamper-evident timestamps for evidentiary integrity.

  • eDiscovery & chain of custody

    Content-addressed storage and immutable receipts can simplify integrity verification and chain-of-custody documentation.

  • Independent verification

    Any third party can verify integrity from a transaction ID - no vendor involvement required.

Security & privacy controls

  • Encryption & key control

    Supports customer-managed encryption workflows so access can be controlled by keys, not by storage operators.

  • Gateway policy controls

    Access enforcement and policy controls live at the gateway/application layer - where enterprises already operate controls.

  • GDPR-oriented handling patterns

    Patterns like encryption key destruction (“crypto-shredding”) and gateway moderation can support privacy requirements; applicability depends on your use case and counsel.

Making compliance easy

By using cryptographic proofs, any auditor, regulator, or third party can independently verify data integrity using only a transaction ID - without signing NDAs or requiring vendor involvement. With verifiable security, trust is not required.

Transparency

Security through openness, not obscurity.

What We Do

  • All code is open source ( github.com/ar-io)
  • Observation reports stored permanently on Arweave
  • All network state publicly verifiable on-chain
  • Economic model and endowment fund publicly documented
  • Full security architecture document available upon request

What We Don't Do

  • No server-side encryption. You control all encryption.
  • No data deletion by design. Crypto-shredding available.
  • No data residency controls. Global replication by design.
  • No vendor access to your plaintext data
  • No recurring fees that could lapse and put data at risk

Common Questions

How do I verify data integrity?
With only a transaction ID, you can retrieve data from any of hundreds of gateways, recompute its Merkle root, and compare against the on-chain root. A match provides mathematical proof the data is byte-for-byte identical to the original. No vendor involvement needed. The Wayfinder protocol provides client-side routing and cryptographic verification out of the box.
How is data encrypted?
All encryption is client-side, before data reaches ar.io. We recommend authenticated encryption (for example, AES-256-GCM). You manage all keys and we never have access to plaintext data. You can use any enterprise KMS, HSM, or ArDrive's built-in encryption.
Can data be deleted?
No, by design. Data on Arweave is permanent. For GDPR scenarios, teams commonly use crypto-shredding (destroying the encryption key renders encrypted data mathematically inaccessible) and gateway-level content moderation.
What if I accidentally upload unencrypted data?
It is permanently and irreversibly public. This is the most important operational risk to address before deployment. Use mandatory encryption pipelines or ArDrive private drives, which encrypt data automatically before upload.
Where is data stored?
Across decentralized mining nodes in dozens of countries. Data is replicated hundreds of times via economic incentives. You cannot restrict geographic location. Global replication is by design, which means no single regional disaster can affect availability.
What happens if ar.io shuts down?
Your data persists on the Arweave network regardless of ar.io's status. The gateway software is open source and fully self-hostable. You can run your own gateway and access your data with zero vendor dependency.
How is this different from a traditional backup vault?
Traditional vaults enforce immutability with software policies that privileged administrators can override. Arweave enforces immutability at the protocol level. There is no override mechanism, no admin concept, and no single entity with deletion capability.
How does ar.io relate to content provenance standards like C2PA?
Arweave's architecture is naturally aligned with C2PA (Coalition for Content Provenance and Authenticity) standards. Both use SHA-256 hashing and Merkle trees. C2PA's biggest vulnerability is metadata stripping: platforms and file transfers routinely remove provenance manifests. Permanent storage solves this by preserving provenance records independently and immutably, so authenticity can always be verified even after manifests are stripped from the original content.

Verify it yourself

Upload test data, get a transaction ID, and independently confirm integrity from any gateway. Or talk to our team about your security requirements.