The UltraUpload system builds upon four novel components.
1. Decentralized Storage Network (DSN)
We provide an abstraction for network of independent storage providers to offer storage and retrieval services.
2. Novel Proofs-of-Storage and Replication
allows storage providers to prove that data has been replicated to its own uniquely dedicated physical storage. Enforcing unique physical copies enables a verifier to check that a hoster is not deduplicating multiple copies of the data into the same storage space
3. Verifiable Markets
We model retrieval requests as orders in a decentralized verifiable market operated by the UltraUpload. io network. Verifiable markets ensure that payments are performed when a service has been correctly provided. We present the Bandwidth Market where Hosters and clients can respectively submit up/download orders.
4. Data Structures with Chunks
A chunk is some part of data that a uploader is storing in the Ultra-Raid (DSN). For example, data can be divided into many chunks and each chunk can be stored by a different set of Hosters.
 Juan Benet. IPFS – Content Addressed, Versioned, P2P File System. 2014
IPFS is a new protocol to decentralize the web. IPFS enables the creation of completely decentralized and distributed applications, using content addressing and digital signatures. IPFS makes the web safer, and more open.
Features of the UltraUpload. io Network
The UltraUpload.io (Secure Access For Everyone) Network is made up of the unused hard drive space, processing power and data connection of its users. It offers a level of security and privacy not currently available on the existing Internet and turns the tables on companies, putting users in control of their data, rather than trusting it to organisations. A number of features make this possible:
Self-Encryption: Data which encrypts itself, with itself.
Files uploaded to the network are broken into pieces, encrypted and distributed across the network. This process is called Self-Encryption.
When a user uploads (or saves) a file to the network, via one of the UltraUpload. io Network apps, the file is automatically broken up into chunks. These chunks are then encrypted (encoded so that only authorised parties can read it), randomised and stored on the computers of other UltraUpload. io Network users. These encrypted chunks are completely unreadable and inaccessible to anyone other than the paying user.
Distributed network with opportunistic data caching.
The UltraUpload.io Network is fully decentralised, with files distributed and stored all over the world, on different devices. This allows the network to be robust to attacks, with no central point of weakness.
The distributed nature of the network provides your data with physical security, meaning that no third party can access or delete it, as can happen with existing centralised solutions. The feature called Opportunistic Caching automatically creates more copies of popular data closer to where it is being requested, so popular websites and other data feeds will actually speed up as they get more visitors, rather than slow down and crash as they do on todays web.
Data availability and built-in redundancy.
The network is programmed to keep duplicate copies of each piece of data at all times. As users turn their computers off, the network makes more copies and stores them on other machines, ensuring that users always have access to their files.
This constant movement of data (called churn) is a key part of the security that the UltraUpload. io Network offers because there is no central point for hackers to target as the data locations keep changing.
Unneeded duplicates are automatically removed.
Once a file is uploaded, other users who upload the same file will be automatically referred to the original, limiting the number of copies and reducing the computing resources needed to store it.
Global distribution without human intervention.
Hosting: an incentive for a crowd sourced Internet.
Payments are given as an incentive to users for providing their upload-resource to the network. This resource is their bandwidth (not storage space, not CPU) that enable the encrypted chunks of network data to be stored and retrieved from their computer. Each piece of encrypted network data is stored in a Hosters Vault, a data storage and management location on the Hoster computer which they cannot read, or access. The UltraUpload. io network is designed to self-manage these resources.
Resource based economy.
As network data is retrieved from a computer, the network pays to the hoster. This payment takes place every time data is retrieved. The payment is automatically paid by the network into the users wallet address that is tied (cryptographically) to their vault. The amount of payment a hoster can earn is directly linked to how much resource they provide to the network.
Proof of resource.
The resource provided by each hoster is continually checked by the network to make sure that it is still available. It does this by attempting to store a random piece of data. Should the network find that the resource committed to the network is no longer available, it reduces the rank of the vault.
Which kind of files are allowed to upload?
You can upload all files you want. For the most known filetypes/codecs we offer the possibility to stream it directly. Actually we are supporting the following filetypes/codecs for streaming:
Audio : MP3;AAC;Ogg Opus;WebM Vorbis;WebM Opus;WAV-PCM
Video : MP4; WebM; Ogg Theora
Docs : . php; . php; . txt
Up to which filesize can I upload my files?
The maximum file size is not limited.
Are there any download speed limitations?
Currently there are no limitations. It depends on many factors, but its in average 8-10 times faster than download from just one server.
How long are my files hosted?
Files will be deleted after variable days of inactivity. The files with low traffic will be deleted first, if storage place is rare.
You own the data. You control the network. Indeed, you are the network.
Revolution of Censorship/Copyright-Resilience
Non of the participants of that network host a copyright protected file. Hoster receive and deliver only chunks which are basically useless bit-sequences, like 0100101010011. All or at least the most sequences are very common to a wide range of files. For example the mentioned sequence can be found in a private picture of your family, in a mp3 recording of your mother AND in a Hollywood Movie. The legal consequence is very clear if you limit the chunk length to 1. Does anybody in the world has a copyright to the 1 or to the 0? If you increase the chunk-length to 2, the number of questions does only increase: Can anybody in the world claim a copyright to 00,01,10 or 11? If no, where is the length of chunks, where this answer turns into yes? But however, someone needs to rebuild the chunks to a file. This happens (same as the split process during upload) on the local machine of the user. Here therefore the user needs a blueprint, which is in fact also just another file. The blueprint of another blueprint, as well as its blueprint are also just chunks. The hoster itself hosts files, which are sometimes part of a file A, blueprint of file B, blueprints of blueprints of file C and that at the same time with the same file. There is technically no separation possible between legal and illegal files. Or in other words: One hoster hosts the Nitro, the other the glycerine. If a bomb is created it happens on the user machine, who orders Nitroglycerine instead of Nitro or Glycerine. An Ultraupload. io-Link is just a pointer into a set of legal content. This pointer is only used on the publisher-website and generated by the uploader. Because most of the sequences are already hosted in the network (used within other files), most of the uploads are very fast.