{"id":700,"date":"2016-01-21T18:01:05","date_gmt":"2016-01-22T01:01:05","guid":{"rendered":"http:\/\/sync.gyre.wpengine.com\/?p=700"},"modified":"2025-03-03T09:19:57","modified_gmt":"2025-03-03T16:19:57","slug":"understanding-the-sync-encrypted-folder","status":"publish","type":"post","link":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder","title":{"rendered":"Understanding the Sync Encrypted Folder"},"content":{"rendered":"<p>For Resilio Sync 2.3 we\u2019re releasing a new type of folder: the Encrypted Folder. The Encrypted Folder extends the functionality of the existing standard folder by giving you the ability to have peers that hold data encrypted at rest. An encrypted peer can communicate with both read-only and read-write peers by sending and receiving data from them.<br \/>\n<!--more--><br \/>\nAfter you install Resilio Sync 2.3 (formerly BitTorrent Sync) you will see an additional folder type called \u201cEncrypted Folder\u201d. When you choose this option, you will be able to have an encrypted node as a part of the mesh of peers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-701\" src=\"http:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_1.jpg\" alt=\"bt-report-2015_Layer_Comp_1\" width=\"940\" height=\"530\" srcset=\"https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_1.jpg 940w, https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_1-300x169.jpg 300w, https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_1-768x433.jpg 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/p>\n<p>The Encrypted Folder is an extension to the standard folder. When you create it you will have three keys:<\/p>\n<p><strong>Read-Write key. <\/strong>The Read-Write key allows peer to talk with Read-Write, Read-Only and Encrypted peers and modify files in the folder. Read-Write keys start with D.<br \/>\n<strong>Read-Only key. <\/strong>The Read-Only key allows peer to talk with Read-Write, Read-Only, and Encrypted peers and to receive file updates to a folder and decrypt it. Read-Only keys that support encrypted folders start with E.<br \/>\n<strong>Encrypted key.<\/strong> The Encrypted key allows peer talk with Read-Write, Read-Only, and Encrypted peers and to receive updates to folder without the ability to decrypt or modify it. Encrypted keys start with F.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-702\" src=\"http:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_2.jpg\" alt=\"bt-report-2015_Layer_Comp_2\" width=\"940\" height=\"530\" srcset=\"https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_2.jpg 940w, https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_2-300x169.jpg 300w, https:\/\/getsynccom.wpenginepowered.com\/wp-content\/uploads\/2016\/01\/bt-report-2015_Layer_Comp_2-768x433.jpg 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/p>\n<p>When data is being moved, clear-text (RO and RW) peers encrypt data using a Storage Key before sending it to an Encrypted peer. Data is always encrypted while in transfer using a Session Key.<\/p>\n<p>With the introduction of the Encrypted Folder, peers can communicate in two ways:<\/p>\n<p>When two peers that can decrypt data (RW and RO peers) talk with each other, they establish an AES-128 encrypted channel between them and send data through this channel. Data is encrypted during transit using a Session Key, and decrypted before being stored locally.<\/p>\n<p>When an Encrypted peer talks with a clear-text (RO and RW) peer, they establish an encrypted AES-128 channel using a Session Key, but the clear-text peer additionally encrypts data with an AES-128 Storage Key before transmission. During transmission data is encrypted twice through the use of both Session and Storage Keys. When an encrypted peer receives data from the channel, it is still AES-128 encrypted.<\/p>\n<p>An example use case for the encrypted folder is using Sync to share cuts of a promotional video with a client. You can create a folder with the edited cuts on two machines A and B using a Read-Write key. This way you can edit on multiple machines and have the data in the folder automatically sync. You can provide an Encrypted key to a 3rd party cloud provider or a NAS device at a different location, so that machine will get an encrypted copy of all the videos. It can then be used as an offsite backup and ensure availability of the files in case your machines are offline. Finally, you can provide the Read-Only key to your client so they can see the videos, but not modify or delete them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For Resilio Sync 2.3 we\u2019re releasing a new type of folder: the Encrypted Folder. The Encrypted Folder extends the functionality of the existing standard folder by giving you the ability to have peers that hold data encrypted at rest. An encrypted peer can communicate with both read-only and read-write peers by sending and receiving data [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[178,58,60,179,261,155,36,177],"class_list":["post-700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-android-2","tag-bittorrent-sync","tag-developer-2","tag-encrypted","tag-hide-in-search-results","tag-pressroom","tag-privacy","tag-sync-2-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding the Sync Encrypted Folder | Resilio Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Sync Encrypted Folder | Resilio Blog\" \/>\n<meta property=\"og:description\" content=\"For Resilio Sync 2.3 we\u2019re releasing a new type of folder: the Encrypted Folder. The Encrypted Folder extends the functionality of the existing standard folder by giving you the ability to have peers that hold data encrypted at rest. An encrypted peer can communicate with both read-only and read-write peers by sending and receiving data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\" \/>\n<meta property=\"og:site_name\" content=\"Resilio Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-22T01:01:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T16:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Konstantin Lissounov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Konstantin Lissounov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\"},\"author\":{\"name\":\"Konstantin Lissounov\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/27b138f12cffb70bce0ab1b59d1389c8\"},\"headline\":\"Understanding the Sync Encrypted Folder\",\"datePublished\":\"2016-01-22T01:01:05+00:00\",\"dateModified\":\"2025-03-03T16:19:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\"},\"wordCount\":503,\"publisher\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png\",\"keywords\":[\"android\",\"bittorrent sync\",\"developer\",\"encrypted\",\"hide in search results\",\"pressroom\",\"privacy\",\"sync 2.3\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\",\"url\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\",\"name\":\"Understanding the Sync Encrypted Folder | Resilio Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png\",\"datePublished\":\"2016-01-22T01:01:05+00:00\",\"dateModified\":\"2025-03-03T16:19:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage\",\"url\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png\",\"contentUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png\",\"width\":940,\"height\":530},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.resilio.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Sync Encrypted Folder\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#website\",\"url\":\"https:\/\/blog.resilio.com\/blog\/\",\"name\":\"Resilio Blog\",\"description\":\"Explore Common Use cases, How to&#039;s, Comparisons &amp; More\",\"publisher\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.resilio.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#organization\",\"name\":\"Resilio\",\"url\":\"https:\/\/blog.resilio.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png\",\"contentUrl\":\"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png\",\"width\":512,\"height\":512,\"caption\":\"Resilio\"},\"image\":{\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/resilio-inc.\",\"https:\/\/youtube.com\/resilio\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/27b138f12cffb70bce0ab1b59d1389c8\",\"name\":\"Konstantin Lissounov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6715f7613c89e38c038e855637eb94bea0f8f6c7b4fa034fd4f85ec1a5ce2d88?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6715f7613c89e38c038e855637eb94bea0f8f6c7b4fa034fd4f85ec1a5ce2d88?s=96&d=mm&r=g\",\"caption\":\"Konstantin Lissounov\"},\"sameAs\":[\"http:\/\/Use%20this%20user%20as%20author%20when%20assigning%20posts%20to%20Kos\"],\"url\":\"https:\/\/blog.resilio.com\/blog\/author\/konstantin-lissounov\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding the Sync Encrypted Folder | Resilio Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder","og_locale":"en_US","og_type":"article","og_title":"Understanding the Sync Encrypted Folder | Resilio Blog","og_description":"For Resilio Sync 2.3 we\u2019re releasing a new type of folder: the Encrypted Folder. The Encrypted Folder extends the functionality of the existing standard folder by giving you the ability to have peers that hold data encrypted at rest. An encrypted peer can communicate with both read-only and read-write peers by sending and receiving data [&hellip;]","og_url":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder","og_site_name":"Resilio Blog","article_published_time":"2016-01-22T01:01:05+00:00","article_modified_time":"2025-03-03T16:19:57+00:00","og_image":[{"width":940,"height":530,"url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png","type":"image\/png"}],"author":"Konstantin Lissounov","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Konstantin Lissounov","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#article","isPartOf":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder"},"author":{"name":"Konstantin Lissounov","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/27b138f12cffb70bce0ab1b59d1389c8"},"headline":"Understanding the Sync Encrypted Folder","datePublished":"2016-01-22T01:01:05+00:00","dateModified":"2025-03-03T16:19:57+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder"},"wordCount":503,"publisher":{"@id":"https:\/\/blog.resilio.com\/blog\/#organization"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage"},"thumbnailUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png","keywords":["android","bittorrent sync","developer","encrypted","hide in search results","pressroom","privacy","sync 2.3"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder","url":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder","name":"Understanding the Sync Encrypted Folder | Resilio Blog","isPartOf":{"@id":"https:\/\/blog.resilio.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage"},"thumbnailUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png","datePublished":"2016-01-22T01:01:05+00:00","dateModified":"2025-03-03T16:19:57+00:00","breadcrumb":{"@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#primaryimage","url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png","contentUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2016\/01\/encryption-hero.png","width":940,"height":530},{"@type":"BreadcrumbList","@id":"https:\/\/blog.resilio.com\/blog\/understanding-the-sync-encrypted-folder#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.resilio.com\/blog"},{"@type":"ListItem","position":2,"name":"Understanding the Sync Encrypted Folder"}]},{"@type":"WebSite","@id":"https:\/\/blog.resilio.com\/blog\/#website","url":"https:\/\/blog.resilio.com\/blog\/","name":"Resilio Blog","description":"Explore Common Use cases, How to&#039;s, Comparisons &amp; More","publisher":{"@id":"https:\/\/blog.resilio.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.resilio.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.resilio.com\/blog\/#organization","name":"Resilio","url":"https:\/\/blog.resilio.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png","contentUrl":"https:\/\/blog.resilio.com\/wp-content\/uploads\/2024\/05\/cropped-resilio-icon-digital-navy-background.png","width":512,"height":512,"caption":"Resilio"},"image":{"@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/resilio-inc.","https:\/\/youtube.com\/resilio"]},{"@type":"Person","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/27b138f12cffb70bce0ab1b59d1389c8","name":"Konstantin Lissounov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.resilio.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6715f7613c89e38c038e855637eb94bea0f8f6c7b4fa034fd4f85ec1a5ce2d88?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6715f7613c89e38c038e855637eb94bea0f8f6c7b4fa034fd4f85ec1a5ce2d88?s=96&d=mm&r=g","caption":"Konstantin Lissounov"},"sameAs":["http:\/\/Use%20this%20user%20as%20author%20when%20assigning%20posts%20to%20Kos"],"url":"https:\/\/blog.resilio.com\/blog\/author\/konstantin-lissounov"}]}},"_links":{"self":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts\/700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/comments?post=700"}],"version-history":[{"count":0,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/posts\/700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/media\/705"}],"wp:attachment":[{"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/media?parent=700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/categories?post=700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.resilio.com\/blog\/wp-json\/wp\/v2\/tags?post=700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}