Storj (STORJ)

Storj (STORJ) -
Rent Your PC

STORJ offers decentralized, open source, end-to-end encrypted, cloud storage where only the end user has access to their personal data. The CEO is Ben Golub.

Basic Intro

Name (Ticker)
Storj (STORJ)
Price (USD)
Active Supply
135.8 million
Total Supply
135.8 million
Volume (24H)
4.4 million
36.9 million
Fun Name
Rent Your PC
Website Links
Block Explorer




  • Secure storage
  • Low cost data storage


  • Possible data loss
  • Not as fast as other SSD cloud hosting


Storj is not a proof of concept or and ICO promising innovation down the road but is already operational. Storj has their own ERC-20 token, currently operating on the Ethereum blockchain. Pay-outs are done in their native STORJ token, and the token can then be used to buy storage on the Storj network. Due to the fluctuation of the value of the STORJ token, prices are set in dollars. Storage costs $0.015 per GB per month, and $0.05 per GB downloaded file.

Key Points

  • What problem does STORJ solve
  • Encryption for cloud storage
  • Files as Encrypted Shards

The removal of central controls potentially mitigates most traditional data failures and outages, as well as significantly increase security, privacy, and data control. Existing cloud storage solutions rely almost exclusively on large storage providers acting as trusted third parties in transferring and storing data and is fully based on trust.

Using client-side encryption is nonstandard when using existing cloud storage services, the traditional cloud is vulnerable to a variety of security threats, including man-in-the-middle attacks, malware, and application flaws that expose private consumer and corporate data. The Equifax hack, where hackers have stolen personal information from 143 million US consumers, including names, Social Security numbers, birthdates, addresses, driver’s license numbers, and some credit card numbers, shows this is a real problem.

A ‘shard’ is a portion of an encrypted file to be stored on this network. This system protects the content of the data from the storage provider storing the data. The owner of the data retains complete control over the encrypted key, and hence has full control over the data.

Main Team

  • Ben Golub
  • Shawn Wilkinson
  • John Quinn
  • Philip Hutchins