PLATFORM LOGO WHITE FINAL (working copy) copy

SpiderOak’s Trusted Application Platform

A secure software platform for effortlessly building cryptographically secure software in business-critical environments

Introducing the SpiderOak Trusted Application Platform

Build Your Own No Knowledge Applications

For years, our customers have been asking us how they can build their own No Knowledge software

We finally have an answer.

Introducing SpiderOak’s Trusted Application Platform.

Now users can augment their HTML 5 skills with the same systems and methodology we use to develop our own CrossClave and Semaphor products to build their own end-to-end encrypted, cross-platform, private blockchain applications.

Yes, you read that right – Build your own No Knowledge applications with just HTML5.

4-devices.png (working copy) copy

Manage Access to Information, Limit Attack Vectors, and Reduce Data Leaks

laptop-cellphone crossclave 1

SpiderOak's Trusted Application Platform

The Trusted Application Platform is a complete end-to-end solution for building trustworthy, cross-platform software leveraging No-Knowledge Blockchain. It is comprised of several different components that all come together to make it easy for you to ship software that you and your customers can depend upon.

Better Management of Policy, Trust, and Need To Know

Addressing System Authority, Identity, Confidentiality, Integrity, and Availability

Perhaps the biggest challenges facing computer security today is  management and enforcement of need to know, of trust around data and processes.

Traditional systems task IT infrastructure securing authority, identity, confidentiality, integrity, and availability of system resources and information, yet the news is rife with evidence that this approach is not keeping up with attacks or the attackers, as the failure of a single point of trust can compromise an entire system.

Testing software

An Industry Unique Approach to Secure Application Development


Building trustworthy, cross-platform software

SpiderOak comes at the problem from a completely different perspective, via the careful application of blockchain technology. By applying the distributed ledger it is not only easy to manage access to information, it also drastically limits the number of things an attacker can take advantage of to breach your defenses.

The SpiderOak Platform reduces the risk associated with failures of trust through key-based management of identity and authority, a powerful policy engine to digitally enforce compensating controls, and through Distributed Ledger  Technology, to manage information access.

With the SpiderOak Platform , it is easy to manage access to information, limit vectors of attack, and reduce data leaks in the top-level application.

End-to-end Encrypted Applications on a Private Blockchain

The platform features:

Distributed Ledger/Private Blockchain Technology

  • The Platform uses DLT with public-key cryptography to produce a platform to create and manage collaborative enclaves.

Powerful Policy Engine

  • All transactions on the ledger are validated by a flexible policy engine. This engine, programmed in an extensible policy language, provides rules and roles within the system.

Public-Key Based Identity

  • Identity is managed within the system by a unique public/private keypair for each user within the system. Users utilize the same set of account keys in any deployment of SpiderOak services, regardless of location.

Cryptographic Compartmentalization

  • Through the application of distributed ledger & public-key based identity, endpoints can secretly negotiate a shared key that is known only to the endpoints that negotiated it and is used to encrypt all data.
logsecure graphic 2

Next Steps

To learn more about Platform and all of SpiderOak's secure communications, collaboration, back-up and storage products please contact us below:

PLATFORM LOGO BLACK FINAL (working copy) copy