Autonomous, Decentralised, Encrypted.

The SAFE Network: How it works, and what it means for the future of communication.

Vaults

The SAFE Network is powered by the spare computing power of its users, with data stored as encrypted pieces on other people’s devices, in storage locations called Vaults.

Connected together, these Vaults—or nodes—create a network that can manage all our data and communications: a global decentralised network free from corporate servers, so it can’t be controlled or restricted. Instead, everyone in the world has equal and secure access to information.

Each node is rewarded in Safecoin by the Network as data is stored and retrieved from their computer.

The web hosted by everyone, controlled by no-one.

Learn more about Vaults

Browsing the SAFE Network

For secure, anonymous and completely private access to the Network all you need to download is a SAFE browser. No more snooping, eavesdropping, or censorship. And when you’re done, close the browser and leave no trace behind.

Try browsing the SAFE Network, which is currently in the Alpha 2 stage of development.

You can try out the SAFE Network, which is currently in Alpha 2 stage of development, by downloading the SAFE Browser

Download Browser

The First Autonomous Network

We’re creating the world’s first, and only, autonomous network. There is no human intervention required for it to manage your data and communications.

This self-managing and self-configuring behaviour, inspired by the humble ant, enables an Internet completely free of middlemen, that is not owned or controlled by any corporation or government. It’s the Internet owned by humanity as a whole, for the benefit of everyone. Exactly as it should be.

A network owned by humanity, not by corporations

Why we need an Autonomous Network

Self Authentication

Create an account to upload, store and edit your data. Interact directly with the Network: no third parties are involved. Anyone can open an account.

The SAFE Browser acts as your secure gateway to the Network, your data and your apps. Authenticate using one password in the Browser and you have complete control of your data.

Your SAFE password never leaves your computer, meaning it can’t be stolen from the Network. And to retain anonymity, the identity (IP address) of your computer on the Network is hidden using SAFE’s Self Authentication technology.

One password for everything. No gatekeepers.

Why Self-Authentication Matters

Self Encryption

All data on the SAFE Network is protected by several layers of encryption. As data is uploaded to the Network it is first broken into pieces which are then ‘self-encrypted’, a process where the data encrypts itself with itself.

Once the data is split into encrypted chunks, the Network autonomously stores these across the Network, at random locations selected by, and only known to, the Network.

As the data is encrypted on your computer before being stored, no keys or passwords ever leave your machine. This means only you can access your data, unless of course you choose to share it, or make it public.

Self Encryption Explained

Data Chains

Many decentralised networks use blockchains. These work well as public ledgers, however they don’t perform well for data storage. They are simply too expensive, too slow and have problems with scalability.

That’s why the SAFE Network doesn’t use a blockchain. Instead it uses something designed for the task: Data Chains.

Data Chains facilitate large amounts of data being passed between nodes at and can also enable the network to recover from a full system outage. And by using and recording nodes digital signatures, we can also ensure that it is not possible to forge identities in the network, keeping your data safe and secure.

Exchanging data on a global scale. Far beyond blockchain

What are Data Chains?

The countdown to the new Internet has begun. Try, test, build, contribute. Be part of it.