Knowledge Base, Step-By-Step

  1. Every data project you create is represented by a folder on your computer in your home directory/
  2. Every file or folder that you add to your project will be analyzed by software. Custom metadata for that file will be generated and contain key information, such as name, size, extension, creation date, modification date, and checksum.
  3. Files are analyzed, indexed, and added to your account after adding a file to a project.
  4. All connections to and from, along with the direct connections between users, are encrypted using RSA 2048 bit keys and SSL TLS 1.2 connections with AES256 encryption. uses OpenSSL:
  5. Data confidentiality is our primary objective, so shared files are only accessible by users who you authorize.
  6. If a user loses their device, its file access can be revoked via the web application. Device removal requires email confirmation. When device is removed from the access list, all data will be wiped the next time that it goes online.
  7. Devices are authenticated by a secure certificate, which is issued at the point of registration with
  8. instantly syncs all shared data with a user once they register and add their devices.
  9. Invited users receive an index of all files available to them. Project members can browse through an unlimited amount of files of any size, and quickly access those which they need immediately.
  10. Smart Sync allows each project to have rules for automatic syncing of files which meet specified criteria, such as file size, file name, file type, and more.
  11. When a file is shared through, it is not being uploaded anywhere. Rather, its metadata is synced to the account, passing it through to all devices and users who are authorized. does not host your files. Shared files will always remain on the local device.
  12. When an authorized user downloads a file, it sent directly from the host device to the requesting device via our secure peer-to-peer network. Devices that have downloaded the same file will work together to deliver the file to any other user who requests it, increasing transfer speed.
  13. allows users to share massive amounts of data without uploading it to a central location. Users who need any number of files from a large data set can request exactly what they need and receive it from the device which is hosting it.
  14. If a device is expected to be offline at any time, such as laptops that go to sleep, it is imperative that the device is configured to keep a network connection alive while the device is asleep. This ensures that authorized users are still able to access files that have been shared with them. Alternatively, a dedicated device, like the Sherlybox, will keep file access always available. Learn more about it and the Kickstarter campaign at
  15. We plan to expand our storage software to other NAS platforms, and the platform will be vendor agnostic.

7 Jun, 2016
As seen on


We are currently working on the next big step for development which we are calling 2.0.

Join the group of the first users!