Privacy Tools Guide

Privacy-Focused Cloud Storage Comparison 2026

Most cloud storage services — Google Drive, Dropbox, OneDrive — encrypt your data in transit and at rest but hold the encryption keys. This means they can decrypt your files on demand for law enforcement, advertising analysis, or their own AI training. This guide compares services with genuine zero-knowledge encryption, where the provider cryptographically cannot read your files.

Key Terms


Comparison Table

Service Encryption Jurisdiction Audited Free Tier Sharing E2EE
Proton Drive AES-256 + RSA + ECC client-side Switzerland Yes (2023) 1 GB Yes
Filen AES-256 GCM client-side Germany Partial (2022) 10 GB Yes
Tresorit AES-256 client-side Hungary/Switzerland Yes (Deloitte) No (trial only) Yes
Internxt AES-256 client-side Spain Partial 1 GB Yes
Nextcloud (self-hosted) E2EE plugin (optional) Your server Open source Unlimited E2EE beta
Keybase NaCl (libsodium) USA Partial 250 GB Yes

Proton Drive

Proton Drive uses the same key infrastructure as ProtonMail — your private keys are encrypted with your account password and stored on Proton’s servers, decrypted only client-side.

Encryption scheme:

File → AES-256-GCM (random file key)
File key → encrypted with your OpenPGP public key
Your private key → encrypted with AES-256 derived from your password (bcrypt)

Proton servers see: encrypted file blobs, encrypted file keys, encrypted private key, username (email), payment info.

Jurisdiction: Switzerland — Federal Data Protection Act; not subject to EU GDPR or US FISA. Proton has received Swiss legal process demands (they’ve published a transparency report since 2014). They cannot comply with decryption requests because they don’t hold plaintext keys.

Limitations:

# CLI access via Proton Drive API (unofficial, proton-bridge)
# Or use the official desktop client for Linux:
# Download from proton.me/drive/download

Filen

Filen is a newer service (2020) with aggressive zero-knowledge claims. Unlike Proton, Filen’s code is fully open source (client + server).

Encryption scheme:

File → AES-256-GCM (random per-file key)
File key → encrypted with your master key
Master key → derived from password via Argon2

What makes Filen distinctive:

Limitations:

# Filen CLI (upload from command line)
npm install -g @filen/cli
filen login
filen upload /local/file.pdf /remote/path/

Tresorit

Tresorit is the enterprise-focused option. It’s been independently audited by Deloitte and has strong compliance certifications (ISO 27001, SOC 2 Type II).

Encryption scheme: AES-256 + RSA-4096 for key exchange. Keys are generated on the client; zero-knowledge by design.

Jurisdiction: Incorporated in Hungary; data stored in Switzerland, Netherlands, or Ireland depending on your plan. EU GDPR applies.

Distinctive features:

Best for: Legal, medical, or financial professionals who need compliance documentation and enterprise controls.


Internxt

Internxt is decentralized: your encrypted file shards are distributed across a network of nodes (similar to Storj), not stored on a single server.

Architecture:

File → AES-256-GCM encrypt → split into N shards → distribute across network
(no single node has enough shards to reconstruct the file)

What this means for privacy: Even if an adversary compromises some nodes, they cannot reconstruct files without sufficient shard count AND your decryption key.

Limitations:


Nextcloud (Self-Hosted)

Self-hosting gives you complete control. You choose the jurisdiction, the encryption method, and who has physical server access.

E2EE plugin (Nextcloud Files E2EE):

# Enable on self-hosted instance
sudo -u www-data php /var/www/nextcloud/occ app:enable end_to_end_encryption

# Generate keys (done automatically in Nextcloud client)
# Desktop client: Settings > Security > Set up End-to-End Encryption

Important caveat: Nextcloud’s E2EE plugin is still marked “Technical Preview” in 2026. It has had vulnerabilities (broken authentication in 2022, patched in NC 25). Audit before trusting sensitive data to it.

For server-level security:

# Use client-side encryption before upload as defense-in-depth
# rclone can encrypt files before sending to Nextcloud
rclone config  # create "crypt" remote pointing to your Nextcloud remote

# In rclone config:
# [nc-crypt]
# type = crypt
# remote = nextcloud:/encrypted
# filename_encryption = standard
# password = your-strong-passphrase

rclone copy /local/sensitive/ nc-crypt:

Self-Encrypting Before Upload (Defense in Depth)

For any service — even those claiming zero-knowledge — encrypt files yourself before uploading:

# Encrypt a directory with age before upload
tar czf - /local/sensitive/ | age -r "age1yourpublickey..." > encrypted.tar.gz.age

# Decrypt after download
age -d encrypted.tar.gz.age | tar xzf -

# Or use rclone crypt remote (transparent encryption/decryption)
rclone copy /local/sensitive/ gdrive-crypt:sensitive/
# Files on Google Drive are AES-256 encrypted before upload; Google sees ciphertext only

This gives you zero-knowledge properties even with non-zero-knowledge providers like Google Drive.


Threat Model Recommendations

Threat Recommendation
Government data requests to provider Proton Drive (Switzerland) or self-hosted
Provider data breach Any zero-knowledge service + self-encryption
Cross-border data access Switzerland jurisdiction (Proton/Tresorit)
Need audit documentation for compliance Tresorit (Deloitte audit)
Free, zero-knowledge, large storage Filen (10 GB free)
Maximum control Self-hosted Nextcloud + rclone crypt


Built by theluckystrike — More at zovo.one