Free and open source

Your data. Your network. Your control.

Indelible is a local tool that gives you direct access to the Autonomi Network - a decentralised storage network with no central servers and no intermediaries. Indelible runs on your machine. Your data is post-quantum secure.

Download for macOS

Also available for Windows and Linux


What it is

A gateway to the network, not a service

Indelible is not a company, a platform, or a cloud product. It is a free tool that runs locally on your computer and connects directly to the Autonomi Network. You could build the same thing yourself using the CLI - Indelible just makes it easier.

You are in control

Indelible runs on your machine. Your data is post-quantum secure - encrypted and uploaded directly to the Autonomi Network from your computer. Nothing passes through a third party. No account is needed. No one else has access unless you choose to share it.

Built for teams

Indelible was built so that multiple contributors - whether part of the same organisation, research group, or collective - can work together. Upload, tag, organise, and share collections. Your data on Autonomi can be public or private. That decision belongs to the data owner, always.

Truly decentralised

Your data is split into pieces, those pieces are duplicated, and distributed across thousands of independent nodes worldwide. There are no servers to go offline, no company who can take your data. Your data isn't exposed to data centre dependencies or single jurisdictions.


How it works

Install. Upload. Done.

Indelible connects to the Autonomi Network directly from your machine. There is no sign-up process, no cloud dashboard, and no intermediary between you and the network.

1

Install locally

Download Indelible and run it on your computer. It is a local application - it does not phone home, create an account, or require an internet connection beyond network access. You can also access the Autonomi Network directly via the command-line interface if you prefer to build your own tooling.

2

Upload and organise

Select your files - research papers, datasets, records, archives, whatever matters to you. Everything is encrypted before it reaches the network to be distributed and securely stored. Tag, organise into collections, and manage access. Multiple contributors can work on the same collections.

3

It stays

You pay the network's nodes once to store your data - no renewals, no subscriptions, no ongoing costs. Indelible lets multiple contributors share the same payment method, so a team or organisation can manage uploads together. The network has no off switch because there is no central operator to flip it.


Why it works

How the Autonomi Network actually works

If a decentralised network with no central servers that stores data for the life of the network sounds too good to be true, here is why it is not.

There are no servers

Traditional storage depends on data centres owned and operated by companies. If the company goes away, your data goes with it. The Autonomi Network runs on thousands of independent nodes - ordinary computers operated by individuals and small operators worldwide, connected directly to each other. No company controls the infrastructure. No single point of failure can take the network down.

The difference

  • Cloud storage - Your data is on someone else's servers. They can change terms, raise prices, shut down, or be compelled to hand over access.
  • Autonomi - Your data is split, encrypted, and distributed across independent nodes. No single node holds a complete file. No operator can read your data or deny you access.

Your data is encrypted before it leaves your machine

Autonomi uses self-encryption: each file is split into chunks, each chunk is encrypted using the content of the other chunks, and the pieces are distributed across the network. The data is meaningless to any individual node. Only someone with the data map - which never leaves your machine unless you share it - can reassemble the file.

Cryptography

  • Encryption - ChaCha20-Poly1305 with 256-bit keys (quantum-resistant symmetric encryption)
  • Key exchange - ML-KEM-768, the NIST post-quantum standard
  • Authentication - ML-DSA-65, NIST post-quantum digital signatures
  • Content addressing - BLAKE3 hashing, not SHA-256

The economics are designed for persistence

When you upload data, you pay once using the network's native token. That payment covers storage for the life of the network - there are no renewals, no subscriptions, no ongoing costs. Node operators are compensated for storing and serving data. The more useful the network becomes, the more people run nodes, and the more resilient the storage becomes. It is a self-reinforcing cycle, not a business model that depends on a single company staying profitable.

Network integrity

  • Geographic distribution - Data is spread across regions, not concentrated in one jurisdiction or data centre
  • EigenTrust scoring - Nodes build reputation over time. Misbehaving nodes are identified and excluded
  • Sybil resistance - The network is designed to resist attempts to flood it with fake nodes
  • QUIC NAT traversal - Nodes connect directly, even from home connections, without configuration

See it working

265 academic papers - from the original TCP/IP specification to post-quantum cryptography research - uploaded to Autonomi through Indelible and freely accessible.

Visit the Reading Room

Download Indelible

Free, open source, runs locally. Available for macOS, Windows, and Linux.

macOS macOS (Intel) Windows Linux

Indelible is free and open source. View on GitHub