{"id":693,"date":"2016-08-26T11:45:18","date_gmt":"2016-08-26T18:45:18","guid":{"rendered":"http:\/\/sync.gyre.wpengine.com\/?p=693"},"modified":"2022-10-04T15:44:49","modified_gmt":"2022-10-04T22:44:49","slug":"sync-security-and-privacy-brief-now-available","status":"publish","type":"post","link":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available","title":{"rendered":"Sync Security and Privacy Brief Now Available"},"content":{"rendered":"<p>Security and privacy are two of the leading issues for users when transferring important data. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical challenges when there\u2019s a need to share data externally. Resilio Sync offers the ability to sync data securely and privately by replicating data directly between trusted devices and keeping data encrypted in transit.<\/p>\n<p>We take security and user privacy very seriously at Resilio. By design we don&#8217;t capture or store any user data on our infrastructure. Further, we have no way to gain access to user data or personal information. We believe the only way to truly keep user data secure, is to not have any user data. We never see it, we never store it, and we can\u2019t access it &#8212; and neither can any 3rd parties. Any anonymized statistics we collect when you use Sync are sent in the clear, so you know exactly what data we\u2019re gathering.<\/p>\n<p>Here are some of the key security and privacy properties of Sync:<\/p>\n<p>* Sync only transfers data by establishing a direct connection between peers you select. This allows data to exist at rest exclusively on private infrastructure.<br \/>\n* Sync keeps ALL your data private. Other solutions may keep your files private, but store login, usage, and access information on public servers.<br \/>\n* Sync uses cryptographic security instead of a password-based system, and all your data is AES-128 encrypted in transit.<br \/>\n* Sync uses X.509 digital certificates for mutual authentication and validation of file modification requests.<br \/>\n* Insecure, but easy-to-use tools (like email) can be used to securely sync folders with Sync.<br \/>\n* Each device has full control over how it communicates with other peers and services can be limited to increase privacy.<br \/>\n*\u00a0Resilio collects usage statistics from Sync to help us improve the product. This information is sent in the clear so you know what we are gathering.<\/p>\n<p><a href=\"https:\/\/www.resilio.com\/docs\/Resilio_Sync_Security_and_Privacy_Brief.pdf\">Get the Brief<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security and privacy are two of the leading issues for users when transferring important data. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical challenges when there\u2019s a need to share data externally. Resilio Sync offers the ability to sync data securely and privately by replicating data directly between [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[261,36,38],"class_list":["post-693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-hide-in-search-results","tag-privacy","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sync Security and Privacy Brief Now Available | Resilio Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sync Security and Privacy Brief Now Available | Resilio Blog\" \/>\n<meta property=\"og:description\" content=\"Security and privacy are two of the leading issues for users when transferring important data. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical challenges when there\u2019s a need to share data externally. Resilio Sync offers the ability to sync data securely and privately by replicating data directly between [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\" \/>\n<meta property=\"og:site_name\" content=\"Resilio Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-26T18:45:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-04T22:44:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"465\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ilan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ilan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\"},\"author\":{\"name\":\"Ilan\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/e43ad9a790f1cbb982a56c68925c9bce\"},\"headline\":\"Sync Security and Privacy Brief Now Available\",\"datePublished\":\"2016-08-26T18:45:18+00:00\",\"dateModified\":\"2022-10-04T22:44:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\"},\"wordCount\":325,\"publisher\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png\",\"keywords\":[\"hide in search results\",\"privacy\",\"security\"],\"articleSection\":[\"Tech\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\",\"url\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\",\"name\":\"Sync Security and Privacy Brief Now Available | Resilio Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png\",\"datePublished\":\"2016-08-26T18:45:18+00:00\",\"dateModified\":\"2022-10-04T22:44:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage\",\"url\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png\",\"contentUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png\",\"width\":825,\"height\":465},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.resilio.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sync Security and Privacy Brief Now Available\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#website\",\"url\":\"https:\/\/blog.resilio.com\/blog\/\",\"name\":\"Resilio Blog\",\"description\":\"Explore Common Use cases, How to&#039;s, Comparisons &amp; More\",\"publisher\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.resilio.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\",\"name\":\"Resilio\",\"url\":\"https:\/\/blog.resilio.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png\",\"contentUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png\",\"width\":512,\"height\":512,\"caption\":\"Resilio\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/resilio-inc.\",\"https:\/\/youtube.com\/resilio\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/e43ad9a790f1cbb982a56c68925c9bce\",\"name\":\"Ilan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2332a34bbbf66ee122fbe445b7040450cee62e655e3638d86fe80fb23149e603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2332a34bbbf66ee122fbe445b7040450cee62e655e3638d86fe80fb23149e603?s=96&d=mm&r=g\",\"caption\":\"Ilan\"},\"description\":\"Ilan is the co-founder and CPO of Resilio, where he leads the Product and Engineering teams. Before Resilio, he was the GM of Platforms at BitTorrent and was responsible for leading a distributed organization of 120 employees at Check Point Software. Ilan has also served as a visiting scientist at the MIT Media Lab, where he focused on peer-to-peer software research.\",\"url\":\"https:\/\/blog.resilio.com\/blog\/author\/ishamir\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sync Security and Privacy Brief Now Available | Resilio Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available","og_locale":"en_US","og_type":"article","og_title":"Sync Security and Privacy Brief Now Available | Resilio Blog","og_description":"Security and privacy are two of the leading issues for users when transferring important data. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical challenges when there\u2019s a need to share data externally. Resilio Sync offers the ability to sync data securely and privately by replicating data directly between [&hellip;]","og_url":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available","og_site_name":"Resilio Blog","article_published_time":"2016-08-26T18:45:18+00:00","article_modified_time":"2022-10-04T22:44:49+00:00","og_image":[{"width":825,"height":465,"url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png","type":"image\/png"}],"author":"Ilan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ilan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#article","isPartOf":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available"},"author":{"name":"Ilan","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/e43ad9a790f1cbb982a56c68925c9bce"},"headline":"Sync Security and Privacy Brief Now Available","datePublished":"2016-08-26T18:45:18+00:00","dateModified":"2022-10-04T22:44:49+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available"},"wordCount":325,"publisher":{"@id":"https:\/\/blog.resilio.com\/blog\/#organization"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage"},"thumbnailUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png","keywords":["hide in search results","privacy","security"],"articleSection":["Tech"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available","url":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available","name":"Sync Security and Privacy Brief Now Available | Resilio Blog","isPartOf":{"@id":"https:\/\/blog.resilio.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage"},"thumbnailUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png","datePublished":"2016-08-26T18:45:18+00:00","dateModified":"2022-10-04T22:44:49+00:00","breadcrumb":{"@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#primaryimage","url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png","contentUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2015\/12\/Sync-Security-n-Privacy-Brief.png","width":825,"height":465},{"@type":"BreadcrumbList","@id":"https:\/\/blog.resilio.com\/blog\/sync-security-and-privacy-brief-now-available#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.resilio.com\/blog"},{"@type":"ListItem","position":2,"name":"Sync Security and Privacy Brief Now Available"}]},{"@type":"WebSite","@id":"https:\/\/blog.resilio.com\/blog\/#website","url":"https:\/\/blog.resilio.com\/blog\/","name":"Resilio Blog","description":"Explore Common Use cases, How to&#039;s, Comparisons &amp; More","publisher":{"@id":"https:\/\/blog.resilio.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.resilio.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.resilio.com\/blog\/#organization","name":"Resilio","url":"https:\/\/blog.resilio.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png","contentUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png","width":512,"height":512,"caption":"Resilio"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/resilio-inc.","https:\/\/youtube.com\/resilio"]},{"@type":"Person","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/e43ad9a790f1cbb982a56c68925c9bce","name":"Ilan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2332a34bbbf66ee122fbe445b7040450cee62e655e3638d86fe80fb23149e603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2332a34bbbf66ee122fbe445b7040450cee62e655e3638d86fe80fb23149e603?s=96&d=mm&r=g","caption":"Ilan"},"description":"Ilan is the co-founder and CPO of Resilio, where he leads the Product and Engineering teams. Before Resilio, he was the GM of Platforms at BitTorrent and was responsible for leading a distributed organization of 120 employees at Check Point Software. Ilan has also served as a visiting scientist at the MIT Media Lab, where he focused on peer-to-peer software research.","url":"https:\/\/blog.resilio.com\/blog\/author\/ishamir"}]}},"_links":{"self":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts\/693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/comments?post=693"}],"version-history":[{"count":0,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts\/693\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/media\/843"}],"wp:attachment":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/media?parent=693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/categories?post=693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/tags?post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}