Permanent Storage

Permanent Storage is a component of Decoy Phrase that enables the permanent, time-resistant, and immutable storage of decoy text and mapping files, without requiring users to interact directly with the complexity of blockchain technology.

This storage layer is specifically designed for long-term text archival, covering both sensitive data that has been transformed into decoy form and non-sensitive data, while strictly preserving the zero-knowledge principle.

Purpose of Permanent Storage

Permanent Storage is designed to:

  • Store data once and forever (write-once, read-forever)

  • Eliminate reliance on traditional cloud services or centralized servers

  • Reduce the risk of data loss caused by service shutdowns, system migrations, or forgotten accounts

  • Provide a simple user experience without requiring users to understand or manage blockchain infrastructure

Supported File Types

Decoy Phrase Permanent Storage supports text-based files only.

Supported formats
Unsupported formats

.txt

Images (.jpg, .png, .svg, etc.)

.md

Videos (.mp4, .mov, etc.)

.json

Audio (.mp3, .wav, etc.)

Folder

Binary or executable files

circle-exclamation

Shared Master Wallet Model

Decoy Phrase Permanent Storage uses a Shared Master Wallet Model, where a single master wallet is used to store data on the Arweave network.

Why use a Shared Master Wallet?

This approach is deliberately chosen because:

chevron-rightUser conveniencehashtag

Users do not need to:

  • Create or manage a blockchain wallet

  • Store additional private keys

  • Interact directly with Arweave

chevron-rightFocus on data, not blockchainhashtag

Users can focus on:

  • Separating decoy text and mapping files

  • Managing passwords, vaults, and timelocks

  • Planning long-term storage strategies

chevron-rightPermanent Storage is free to usehashtag

Using a single master wallet is more efficient and sustainable for a free permanent storage service.

Zero Knowledge Remains Intact

The use of a shared master wallet does not mean that Decoy Phrase has access to user data or user credentials.

All data stored in Permanent Storage has the following characteristics:

  • Immutable — cannot be modified after upload

  • Permanent — remains available indefinitely

  • Text-only archival — designed specifically for long-term text storage

  • Logically non-custodial — access control remains entirely with the user

  • Meaningless if exposed — without context, the data cannot be used

File Upload Flow

Files uploaded via Decoy Phrase follow a secure and optimized flow before being permanently stored on the Arweave blockchain. This process includes end-to-end encryption, efficient bundling, and reliable on-chain storage. Here's how it works:

1

End-to-End Encryption (via Web Crypto API)

Before your file is sent anywhere, it is securely encrypted on your device using the browser’s native Web Crypto API—a modern cryptographic standard supported in all major browsers (Chrome, Firefox, Safari, Edge).

  • True client-side encryption: Your file is encrypted in the browser, not on the server.

  • No third-party libraries: Unlike legacy tools like crypto-js, Web Crypto API is faster and more secure, running at system-level performance.

  • More secure by design: Encryption is handled directly by the browser vendor (e.g., Google, Mozilla), minimizing bugs or weak implementations.

circle-check
2

Bundling & Upload via Turbo

Once encrypted, your file is tagged with metadata (e.g. App-Name, Account-ID, Encrypted) and sent to Turboarrow-up-right—an enterprise-grade bundling and transmission layer for Arweave.

Turbo provides:

  • Ultra-high-throughput uploads: Supports efficient bundling of many files.

  • Flexible payments: Accepts credit cards and crypto (AR, ETH, SOL, USDC).

  • Turbo Credits: Prepaid credit units for precise storage control.

  • Reliable data pipeline: Guarantees successful transmission to Arweave.

Turbo converts your file into a data item and groups it with others using the ANS-104 bundling standard.

chevron-rightANS-104 Bundling (Arweave Native Standard)hashtag

To reduce cost and improve efficiency, Turbo uses the ANS-104 specification to bundle multiple data items into a single Arweave transaction.

Benefits of ANS-104:

  • Batch upload: Sends many files in one blockchain transaction.

  • Standardized format: Each file remains independently accessible and tagged.

  • Improved indexing: Easier to search and retrieve structured files.

  • Better network efficiency: Reduces network congestion and transaction overhead.

Each file inside the bundle maintains:

  • A unique transaction ID (TxID)

  • Its own tags and metadata

  • Individual accessibility via https://arweave.net/[TxID]

3

Permanent Storage on Arweave

Turbo submits the bundled transaction to the Arweave blockchainarrow-up-right, where it becomes:

  • Immutable – Cannot be deleted or altered

  • Permanently accessible – Through public gateways like arweave.net

  • Individually indexed – Thanks to preserved ANS-104 structure

After Upload: File Detail and Access

After upload, each file has a detail page in Decoy Phrase with a direct link to https://viewblock.io/arweave/tx/[TxID], allowing users to verify the file on-chain and view all associated tags and transaction metadata.

circle-exclamation

Security & Privacy

chevron-rightData-Minimized Registrationhashtag

Decoy Phrase follows a data-minimization principle by design.

  • The system does not request or collect any personal or sensitive information, such as:

    • Email addresses

    • Phone numbers

    • Government IDs

    • Real names or identity documents

  • During registration, users are only required to:

    • Choose a username

    • Create a password

No additional identity verification, personal profiling, or recovery contact data is collected.

chevron-rightPasswords are never transmitted or stored in plaintexthashtag

Passwords used for permanent storage are processed locally on the user’s device. The application performs hashing and key derivation entirely in the browser to generate:

  • an Encryption Key

  • a Wallet Key

circle-info

Technology used: PBKDF2 (Password-Based Key Derivation Function 2) with high iteration counts (typically hundreds of thousands) and SHA-256, transforming user passwords into secure cryptographic keys.

chevron-rightClient-side encryption before uploadhashtag

Before any file is uploaded to permanent storage, its contents, metadata (including title), and owner identifiers are encrypted on the user’s device using AES-GCM 256-bit encryption.

chevron-rightNo decryption keys are ever held by the systemhashtag

Decoy Phrase does not store, receive, or have access to any encryption or decryption keys in any form. All encryption, decryption, and recovery processes run entirely on the user’s device.

chevron-rightPermanent storage only receives encrypted datahashtag

The permanent storage layer never sees plaintext data—only encrypted files that are meaningless without the user’s keys.

Last updated