Share +

STASH Personal   

Developers Security

Very Secure Data Vault for individuals

There is no better place to store your most important, private, and confidential information. Universally available from anywhere, at any time, with any browser. Check out the Stash advantage:

It’s simple.

Sign up. Sign in. (The video will show you how: )

Customize your vault with the folders and smart folders you need. Upload or drag & drop your valuable documents, photos, music, reports – all the things that are most important to you.

You and ONLY you have the option of sharing from your closed environment. The permissions are controlled at the folder level. Share the contents of any folder with anyone or no one. Permission can be granted or revoked at any time.

We deploy advanced multi-factor authentication to ensure that you are really you. And we have made it easy and fun to use! Each user’s data is uniquely secured and protected, encrypted with the strongest encryption available. No user has the same encryption.

We can’t decrypt your data – only you can. We have no idea what your data is and we cannot find out.

Stash several duplicates of your files and shreds your encrypted data into Digital Confetti™ and distributes it randomly to multiple top level secure locations so your data won’t be lost or destroyed. Even if a server or storage location gets hacked AND the hacker can break the strongest encryption available, there is nothing useful to grab.

We keep your data on a completely different network to your office network with its vulnerabilities to phishing and malware attacks. And Stash is not vulnerable to encryption ransomware software like cryptolocker.

We keep multiples of each file, in multiple locations so your data won’t be lost or destroyed.

There is no Stash portal sitting on your computer. No digital gateway between you and your vault.

When you sign out of Stash, your digital footprint is erased. No one can follow you or knows you were here.


Stash was built to protect and secure every kind of digital data. We use multiple digital and physical tactics and protocols to ensure that the data stored in your private vault is secure.

How do we do it?

Since data thieves want to know too, you won’t find all the secrets here. What we can tell you is that these powerful tools are only a part of Stash’s unique security arsenal – the way all stored data will be protected in the future:


Stash uses AES256 (Advanced Encryption Standard with 256 bit key length) to protect your data. When implemented properly, this powerful encryption, the highest standard used for the most sensitive data in the world, would take a lifetime, even several lifetimes for data thieves to hack. In addition not only does every user have a completely unique key to access their data, Stash uses another unique key that combined with the user key, makes for one of the as-secure-as-it-gets standards we use along with others, to protect access to your vault.

File Storage:

Your files are kept securely on servers hosted in world-class data centers in many different places. In fact, your data is generated in multiples to ensure resiliency. It cannot be lost. It is protected using Datacentric Security that in very simple terms, shreds the data. These pieces cannot be put back together again until they are called up by you. Even if an attacker is able to compromise a server your data is stored on, all they will see is unrecognizable digital confetti. Nothing to steal.

File Transmission:

Anytime you upload files into Stash, or download files from Stash to a computer, they are protected by TLS (Transport Layer Security), the most effective tool for securing data in motion. TLS is the "S" in the HTTPS of the Stash URL (the address you type into the browser bar to get here). It is the same encryption and highest level of protection that banks, e-commerce, and governments use to keep their data protected while in transit across the Internet.

Protecting Your Account:

Making sure you, not someone impersonating you, are accessing your data is of vital importance. It is at the very core of why we built Stash.

Someone pretending to be someone else is a major factor in data theft. At Stash, your username belongs to you – and your password does too. We don’t want it (and we’ll never ask you for it). We store only a hash (an anonymous characterization) of your password, not the password itself, so that your vault will recognize you when you sign in and out.

We also use two-factor authentication, something you may be familiar with. This method of proving that you are actually YOU, by sending a text or calling you with an extra code you must provide to access a site is becoming more and more important in the fight against hackers.

STASH has taken this critical game-changer one step further. We use a groundbreaking technology that integrates with your smartphone when logging into Stash. If your smartphone confirms what's on the Stash login page, you are in, and and attackers with just your username and password, are OUT!

Protecting You:

No one at STASH knows who you are. No one at Stash can access or see anything in your vault. We do not collect or save your password. We DO need your email address to communicate with you, which we keep along with your username (which can be anything you want it to be). In fact, we encourage you to choose a username that is as unique and unidentifiable as can be. Your billing information must match what is on file with your credit card company, but after you fill in that information at Stash, it is sent immediately and automatically to, our credit card processor. No trace of your information is kept at Stash.

This is what you can count on when you choose Stash to protect your data:

You will not lose your data.

Others will not gain access to the data you store exclusively here, unless you and ONLY you give specific permission at the individual folder level, for access that can be granted or revoked at anytime.

You will be able to access your data from anywhere, whenever you choose to.

At Stash, we view privacy and security as a right, not a privilege.

We are as fiercely dedicated to the security and privacy of your most valuable data and keepsakes as we are to our very own.

We wouldn’t have it any other way. Neither should you. Now you don’t have to.


Our basic plan includes a two month free trial. Come try it out. Click below and set everything up in just minutes.

Use Cases


Support for your software purchased via the Marketplace is rendered by the individual Software Provider. The CenturyLink Customer Care Team is unable to provide support for your software. However, if you are experiencing issues with the infrastructure that hosts your software, please open a ticket with Below you can find the contact information for support of this software.

For support contact:

End User License Agreement (EULA)

You Agree to the Provider Terms of Service Associated with this Software.
Not a customer? Register now.

Other Products by Stash




SaaS , Security

deployment models

not specified

operating systems

not specified