Platform Clearinghouse Mail VPN Cybersec Pricing
Cloud storage encrypts your files. None prove what happened to them.

Encryption at rest is table stakes. What no provider solves: proving a file was actually deleted, that the access log hasn't been edited, or that the provider itself can't read the data. GDPR Article 17 requires erasure "without undue delay" — but defines no mechanism to prove deletion occurred. India's DPDP Act mandates the right to erasure, with enforcement timelines expected by 2027. There is no standard technical solution.

What this solves
Provable deletion (DATA_DEATH)

When a file is deleted, a DATA_DEATH leaf is committed to the transparency log containing the file ID, ciphertext hash (matching the birth certificate), deleter's fingerprint, timestamp, and revoked shares. The blob is permanently removed. The per-file encryption key's salt is deleted, making re-derivation impossible. The user receives a Merkle inclusion proof — independently verifiable by any third party, including regulators.

Tamper-evident access logging

Every file access commits a FILE_ACCESS leaf with the accessor's fingerprint, access type, ciphertext hash, and timestamp. This is not a database entry the admin can edit — it is a leaf in a Merkle tree. Cloud admin consoles log access, but the provider controls the console and can modify the logs. Sovereign Drive's access log is independently verifiable — the same structure that secures Certificate Transparency for TLS.

Provable sharing with identity binding

Every share commits a FILE_SHARE leaf recording who shared what with whom, at what permission level, and when. ECDH key wrapping ensures sharing is not just logged but cryptographically bound to the recipient's verified identity — the recipient must prove key ownership to decrypt.

Structural AI training protection

The server stores only ciphertext it cannot decrypt. It is structurally impossible to train on ciphertext — not a policy promise, a mathematical property. Combined with the tamper-evident access log, any unauthorized access attempt appears as an anomalous FILE_ACCESS leaf. Cloud providers publish policies saying they don't use customer data for AI training. This makes the guarantee structural.

Cross-product audit in one query

Drive, Mail, and VPN Governance share the same Merkle tree. A single audit query traces: governance decision → email that communicated it → file containing the evidence → who accessed the file → when it was deleted. This cross-product provenance chain does not exist anywhere else.

Business value

GDPR/DPDP compliance: provable deletion independently verifiable by regulators — respond to erasure requests with a downloadable Merkle proof, not a confirmation email. Legal departments: tamper-evident access logs constitute stronger evidence than admin-console exports. Sensitive IP: structural protection against unauthorized access, including by the provider itself. AI-concerned enterprises: mathematical proof that stored data cannot be ingested into training pipelines. Cumulative GDPR fines: €5.88B since 2018. California Delete Act: $200/day compounding fines per unfulfilled request.

Files

📁

Drop files here or click Upload. Each file is hashed, stored in R2, and logged in the transparency log.

 
Encrypting
 
Uploading
 
Anchoring in log
Encrypting...

Shared With You

Files shared with you by other tenants. Each share is recorded as a FILE_SHARE leaf in the transparency log.

Access Control

Manage file shares. Select a file below to see its current shares and revoke access.

Storage Log

Every file operation — uploads, downloads, shares, revocations, deletions — each with a leaf hash from the transparency log.

Billing & Settlement

Metered usage billing for Sovereign Drive. Same Stripe-backed billing infrastructure shared across all ObligationSign verticals.

Storage Used
This billing period
Files Stored
Total active
Operations
Upload + download + share
Identity: Tenant: Tier: Subscription: Billing Cycle: Monthly, metered usage Payment Method:

System Status

Worker health and infrastructure status for Sovereign Drive services.

Drive Worker
File upload, download, share, delete — R2 + KV
Checking...
Protocol Worker
AGTS protocol, gate evaluation, Merkle proofs
Checking...
Key Registry Worker
ECDH-P384 key management, identity infrastructure
Checking...
Log Worker
Transparency log, Merkle tree, inclusion proofs
Checking...

Transparency Log

Tree Size
Root Hash

Deployment Readiness

Prerequisites for full Sovereign Drive operation. All checks must pass before production use.

Identity
CF Access authenticated, email verified
Key Pair
ECDH-P384 key generated and registered
Workers Online
Drive Worker, Protocol Worker, Key Registry, Log Worker
Log STH
Transparency log signed tree head is current
Drive Worker
Sovereign Drive worker deployed and responding
Billing
Active subscription, metered billing configured

What Google Drive can't prove

Google Drive: you trust them. Sovereign Drive: you verify.

Google Drive / Dropbox Sovereign Drive
Access logging Mutable server logs. Provider can edit or delete entries. Merkle-anchored. Every access is a leaf in an append-only hash tree.
Deletion Trust-based. You hope they actually deleted it. Proof-based. DATA_DEATH leaf proves destruction. GDPR-auditable.
Encryption Provider-held keys. They can read your files. Client-held keys (HKDF + AES-256-GCM). Server never sees plaintext.
Sharing Link + ACL. No cryptographic proof of who accessed what. ECDH key wrapping. Recipient must prove cryptographic identity.

Delete ?

This will:

Permanently remove the encrypted blob from storage
Create a Merkle-anchored deletion proof (DATA_DEATH)
Proof is immutably recorded in the transparency log

Share File