2013 will be remembered as 1984: the year we woke up to the reality of server farms and stacks. Our personal information is now property of a few corporations; subject to dragnet data collection by our own government. Today, we rely on centralized cloud services.
We don’t have to.
Decentralized technologies can change the way the Internet works, for good: hardcoding privacy, security, and speed into data exchanges. At BitTorrent, we believe they’re the future.
Turns out, many of you agree.
In November, we introduced Sync 1.2: an updated version of our server-less file syncing tool. It’s quickly become the backbone of free speech initiatives, new blogging platforms, and enterprise file management systems. Within thirty days, our user base has doubled in size. And when it comes to moving data, it’s proved that we can move beyond the cloud.
Today, Sync is moving over 20 gigabytes per person. And that’s a pretty powerful thing. Dropbox’s cloud-based platform stores less than 0.42 gigabytes per user.
This is how Sync works. And this is how the Internet should work. A world where your data stays yours. A world where the free flow of information isn’t subjected to speed limits. And a world where your information isn’t subject to surveillance. Tomorrow’s weather forecast is free of clouds. We’re for it.
Take Sync for a test drive, and let us know what you think. Developers, your API key is here.
About Sync and Privacy
Sync was built for secure sharing. While we have general statistics about the app, we don’t have any access to private information. The client reports back anonymous usage statistics in the same way our other clients do. Sync uses this call to check if there’s a new build available. This call also contains some anonymous statistics that allow us to understand how Sync performs, and how it’s being used; data transferred directly, through relay, size of folders, and number of files synced.
This is the only information we collect, and we left it open intentionally: so that people could see the data we’re collecting. That way, it can be easily verified that we don’t have access to any private information.


