TechRadar Verdict
Storj’s decentralized cloud storage approach breaks your files into hard-to-trace fragments that are spread across the globe, making for one of the safest content-upload suites available.
Pros
- +
Highly-competitive pricing
- +
A sleek web client interface
- +
Advanced upload options using the command-line interface
- +
Decentralized methodology offers top-notch security for uploads
Cons
- -
No mobile support
- -
Command-line interface requires basic coding experience
- -
Files only receive server-side encryption with the web client
Why you can trust TechRadar
Cloud storage platforms are a great way to offload content from desktop and mobile devices, allowing users to access files on-the-go, and usually for a good price. While many services offer encryption and others provide tough firewalls, seasoned hackers can sometimes find a way in.
Storj DCS is a cloud storage service unlike the rest. Instead of uploading your files to a single server, Storj breaks each upload down into 80 distinct pieces that get jettisoned to storage points throughout the world.
More importantly, Is the service worth your time and money? We tested Storj DCS ourselves to find out.
Features and privacy
Storj is one of a few encryption suites that opt for a less traditional way of safeguarding your data, and it’s one of the strongest selling points of the service. As opposed to storing all of a user’s encrypted data on a single host, Storj breaks down encrypted content across multiple nodes (dedicated storage components) in a process known as decentralized cloud storage.
After encryption, files become fragmented into 80 distinct pieces that are spread across 80 distinct nodes throughout the world (Storj operates over 10,000 nodes in 84 different countries). When it comes time for a user to retrieve content, only 29 of these 80 fragments are required for uploading.
If safety of your files is an utmost priority, Storj should be a go-to product. The decentralized model makes it nearly impossible for even the most skilled of hackers to track down your data. Even if they were able to infiltrate a single node, they would never be able to reconstruct file(s) because they would need the other fragments to do so. And remember, the other 28 fragments live in 28 other nodes.
On top of Storj’s decentralized methodology, files are treated to AES-256-GCM encryption, a military-favored protection that is one of the toughest encryptions available. Users can also enable two-factor authentication (2FA) for both Storj’s web client and command-line interface (more on that below).
End-to-end, we would say that Storj is one of the most effective tools for protecting your most valuable data, whether basic documents or media files.
User interface
Storj offers two separate upload interfaces - a simplistic web client for users seeking a basic and streamlined approach to getting content decentralized, and a more advanced command-line interface. The latter is best suited for users with a little coding knowledge, as the command module can be a bit daunting otherwise.
We tested the web client using a MacBook Pro (2020). From an appearance and organization standpoint, everything you need is right on the project dashboard. Storage and bandwidth gauges are front-and-center, effectively tracking how many gigabytes you’ve used for an upload. Below that, you’ll find a Details tab that monitors how many users have access to a project, and how many buckets one project is divided into.
Speaking of buckets: This is what you’ll be using to upload content to the dashboard, as well as manage what users can access your projects. After choosing what files you want to upload, you’ll be able to see which parts of the globe your 80 nodes are located in, as well as assign out links to those you wish to share the files with.
Do be aware that Storj only offers server-side encryption when uploading with the web client. While you’ll be able to generate a passphrase (or have Storj choose one for you), there’s no way to tell what encryptions will be applied to your buckets once they leave your device. For end-to-end encryption, users will want to upload through the command-line.
The Storj command-line is available across Windows, Mac, and Linux devices. Getting started requires a bit of know-how to even get Storj’s command executables working with your machine. Thankfully, the company does offer a number of helpful tools for using their coding. Uploading and downloading with Storj’s command-line is pretty straightforward once you get the hang of it, and best of all, your files will be treated to Storj’s full end-to-end encryption.
Plans and pricing
When it comes to getting what you paid for, Storj delivers plenty of value across two subscription tiers. With the free plan, users have access to up to 150GB of storage per month (with a 50GB limit per project) and a bandwidth limit of up to 150GB per month.
If you need more storage, Storj also offers a Pro account option. Our favorite part of this subscription tier is that you’ll only pay for what you need, and the first 150GB of storage and bandwidth are completely free! After the 150GB cap, the cost breaks down to $4/month for every one storage TB you add to your plan, and $7/month for every added bandwidth TB.
The competition
One Storj alternative is IDrive. While users will only receive an initial 5GB of free storage, the upload process is simple and can be done through email, Facebook, and Twitter. IDrive can also be used to backup PCs, Macs, and mobile devices (no mobile support with Storj), and users only pay $4/year for a 5TB maximum - that’s rock-bottom pricing.
A second cloud storage contender is pCloud. For a lifetime fee of $175, users get 500GB of storage with the Premium plan, and 2TB with the Premium Plus plan (a single $350 lifetime charge). pCloud also lets users choose what servers their content is uploaded to, with options in both the US and Europe.
Final verdict
Storj is one of the absolute safest ways to upload your content to a cloud-space. The decentralized approach is cutting-edge, making it nearly impossible for your personal data to be attacked by even the most seasoned of hackers.
The web client may be all you need to get your files online, although the command-line interface is the preferred means of upload - especially if end-to-end encryption is important to you.
Also check out What is cloud storage?
Do Macs get viruses? The answer is yes – and AI-powered malware is a growing threat, new report claims
This tablet has a genius feature I want every vendor to copy: a second USB-C port that allows you to display content on an external screen
Microsoft continues to mess up Windows 11 Recall, failing to provide fix for weird bug that breaks the feature