Files
Drop files here or click Upload. Each file is hashed, stored in R2, and logged in the transparency log.
Access Control
Manage file shares. Select a file below to see its current shares and revoke access.
Storage Log
Every file operation — uploads, downloads, shares, revocations, deletions — each with a leaf hash from the transparency log.
Billing & Settlement
Metered usage billing for Sovereign Drive. Same Stripe-backed billing infrastructure shared across all ObligationSign verticals.
System Status
Worker health and infrastructure status for Sovereign Drive services.
Transparency Log
Deployment Readiness
Prerequisites for full Sovereign Drive operation. All checks must pass before production use.
What Google Drive can't prove
Google Drive: you trust them. Sovereign Drive: you verify.
| Google Drive / Dropbox | Sovereign Drive | |
|---|---|---|
| Access logging | Mutable server logs. Provider can edit or delete entries. | Merkle-anchored. Every access is a leaf in an append-only hash tree. |
| Deletion | Trust-based. You hope they actually deleted it. | Proof-based. DATA_DEATH leaf proves destruction. GDPR-auditable. |
| Encryption | Provider-held keys. They can read your files. | Client-held keys (HKDF + AES-256-GCM). Server never sees plaintext. |
| Sharing | Link + ACL. No cryptographic proof of who accessed what. | ECDH key wrapping. Recipient must prove cryptographic identity. |