Decentralized storage, identity, access control, and key management services that help developers build secure and privacy-protecting applications.
The application has:
Any assets uploaded to Arcana are encrypted, shared, and distributed across multiple storage nodes. Without a single point of failure, your assets are protected from geographic disasters and hacking attempts.
Want to make sure no one is spying on your users' data? Implement end-to-end encryption simply and easily with E2E Arcana encryption.
Social Authentication with Identity and Access Management
Eliminate friction and allow users to register/login with social authentication and generate keys. Decentralized identity and access control are verifiable without trust and comply with the W3C DID specification. You can rest easy knowing that your application will only allow trusted users to access resources stored on the system.
Managing non-custodial keys
A big hurdle to cryptographic encryption comes from managing public and private keys. Our DKG and KMS make it easy. The network handles user-owned keys and their data, so you don't have to.
Arcana Demo Walkthrough - Arcana BD
Arcana Network Blog - Medium
January 21, 2022
Arcana Network Documentation
Arcana Technical Docs
Developer Dashboard | Arcana Network