
Backblaze uses 256-bit AES encryption to protect your data. This is a highly secure encryption standard that is widely used in the industry.
The encryption process is transparent to the user, meaning you don't need to worry about managing encryption keys or configuring settings. Backblaze handles all of this for you.
Data is encrypted at the source, meaning it's encrypted as soon as it's uploaded to Backblaze. This ensures that your data is protected from the moment it leaves your computer.
Security Features
Backblaze uses 2048-bit public/private keys to secure a symmetric AES 128-bit key that changes for every backup session on your computer.
Backblaze's encryption process is robust, but it's worth noting that if you lose or forget your password, you won't be able to access any encrypted backup data.
You can manage your own encryption keys to add an extra layer of security, but this means that Backblaze won't be able to help you reset the key.
To add an extra layer of security to your account, you can enable multi-factor authentication via SMS or an authentication app like Authy or Duo Mobile.
Backblaze also allows users to integrate logins with the G-Suite single sign-on (SSO) service.
Backblaze's privacy policy is easy to understand, and they collect three categories of personal data: information you provide, automatically collected device data, and third-party service data.
Backblaze may share your information with third-party service providers that require access to your personal information to assist in providing and improving their products.
Backblaze's headquarters are located in San Mateo, California, in the US.
SSE (Server-Side Encryption) is accessible to B2 Cloud Storage users via Backblaze's S3 Compatible API calls, Backblaze B2 Native API calls, and the web UI.
To enable SSE-B2, you need to create an authorization token by calling b2_authorize_account with an application key.
You can enable SSE-B2 on individual file uploads by using the appropriate header information, even if it's not turned on at the bucket level.
To request SSE-B2 encryption for regular files with the B2 Native API, you need to call b2_get_upload_url for the UPLOAD_URL and the UPLOAD_AUTHORIZATION_TOKEN.
Server-Side Encryption (SSE)
Server-Side Encryption (SSE) is a key feature of Backblaze encryption. It allows you to encrypt files with a customer-provided key.
To use SSE, you can call the b2_download_file_by_id or b2_download_file_by_name API with the X-Bz-Server-Side-Encryption-Customer-Algorithm, X-Bz-Server-Side-Encryption-Customer-Key, and X-Bz-Server-Side-Encryption-Customer-Key-Md5 headers. You can also use the corresponding JSON parameters.
To download files encrypted with SSE-C, you'll need to specify the customer algorithm, customer key, and customer key MD5. This is a crucial step in ensuring the security and integrity of your data.
By using SSE, you can rest assured that your files are protected with a strong encryption key that only you control. This provides an additional layer of security and peace of mind.
SSE-C
SSE-C is a type of encryption that allows you to upload files to Backblaze B2 with your own encryption key.
To request SSE-C encryption for regular files, you'll need to use the X-Bz-Server-Side-Encryption-Customer-Algorithm, X-Bz-Server-Side-Encryption-Customer-Key, and X-Bz-Server-Side-Encryption-Customer-Key-Md5 headers with the b2_upload_file API.
You can also use cURL to upload SSE-C files, as shown in the example.
To download files encrypted with SSE-C, you can call b2_download_file_by_id or b2_download_file_by_name with the X-Bz-Server-Side-Encryption-Customer-Algorithm, X-Bz-Server-Side-Encryption-Customer-Key, and X-Bz-Server-Side-Encryption-Customer-Key-Md5 headers, or use the sourceServerSideEncryption JSON parameter when copying from source files/parts.
Here's a list of the main parameters you'll need to use for SSE-C:
- X-Bz-Server-Side-Encryption-Customer-Algorithm
- X-Bz-Server-Side-Encryption-Customer-Key
- X-Bz-Server-Side-Encryption-Customer-Key-Md5
- sourceServerSideEncryption
- destinationServerSideEncryption
Request SSE-C for Large Data
To request SSE-C encryption for large files with the B2 Native API, use the following JSON parameters with b2_start_large_file.
You can request SSE-C encryption for large files by using the b2_start_large_file method with specific JSON parameters.
The encryption parameters of the parts must match those specified when calling b2_start_large_file when uploading large file parts for large files that have been started with SSE-C encryption.
This ensures that the encryption is consistent and secure throughout the entire process.
The encryption parameters include the X-Bz-Server-Side-Encryption-Customer-Algorithm, X-Bz-Server-Side-Encryption-Customer-Key, and X-Bz-Server-Side-Encryption-Customer-Key-Md5 headers.
These headers must be included with the b2_upload_part method to upload large file parts for large files that have been started with SSE-C encryption.
Copy from Encrypted Source with SSE-C

Copying from source files or parts encrypted with SSE-C can be a bit tricky, but don't worry, I've got you covered. To copy from source files/parts encrypted with SSE-C, you'll need to use the JSON parameter sourceServerSideEncryption instead of serverSideEncryption.
The key is to use the correct parameter, as demonstrated in the cURL example. This example shows you how to copy source files/parts encrypted with SSE-C in a straightforward way.
SSE-C Encryption
You can use SSE-C encryption with Backblaze B2 to secure your files. SSE-C stands for Server-Side Encryption with Customer-Keys, which means you get to control the encryption keys for your files.
To upload files with SSE-C encryption, you'll need to add specific headers to your API requests, such as X-Bz-Server-Side-Encryption-Customer-Algorithm, X-Bz-Server-Side-Encryption-Customer-Key, and X-Bz-Server-Side-Encryption-Customer-Key-Md5.
You can also use cURL to upload SSE-C encrypted files, which is a great option if you're working with regular files. This method allows you to specify the encryption parameters upfront.
For larger files, you'll need to use the b2_start_large_file method to request SSE-C encryption, and then upload the file parts with the same encryption parameters.
If you need to download files encrypted with SSE-C, you can use the b2_download_file_by_id or b2_download_file_by_name method, and specify the encryption parameters in the API request.
When copying files from source files or parts encrypted with SSE-C, you'll need to use the sourceServerSideEncryption parameter instead of serverSideEncryption in the API request.
Cost and Security
Backblaze uses advanced encryption methods, including 2048-bit public/private keys to secure a symmetric AES 128-bit key that changes for every backup session.
This means that your backups are encrypted in real-time, making it extremely difficult for unauthorized parties to access your data. Backblaze also stores your backups on their data centers over an SSL connection, keeping your data encrypted at all times.
You can manage your own encryption keys, giving you even more control over your data's security. However, if you lose or forget your password, you won't be able to access your encrypted backup data.
Backblaze offers additional security features, such as multi-factor authentication via SMS or an authentication app, which can be enabled on their website. They also allow integration with G-Suite single sign-on (SSO) service.
Backblaze's privacy policy is clear and transparent, collecting three categories of personal data: information you provide, device data, and third-party service data. This information is used to set up and maintain accounts, but may also be shared with third-party service providers or disclosed if required by law.
Backblaze Security
Backblaze uses 2048-bit public/private keys to secure a symmetric AES 128-bit key that changes for every backup session on your computer.
This key is used to encrypt your backups, which are then sent to Backblaze's data centers over an SSL connection, where they remain encrypted.
You can manage your own encryption keys, giving you full control over your data's security.
However, if you lose or forget your password, Backblaze won't be able to help you reset the key, and you won't be able to access your encrypted backup data.
Backblaze allows users to enable multi-factor authentication for their account via SMS or an authentication app, such as Authy or Duo Mobile, adding an extra layer of security.
You can also integrate your login with the G-Suite single sign-on (SSO) service, making it easier to access your account.
Backblaze's privacy policy is easy to understand, and they collect three categories of personal data: information you provide, automatically collected device data, and third-party service data.
This data is primarily used to set up and maintain accounts, but it may also be shared with third-party service providers to help improve Backblaze's products.
Frequently Asked Questions
Is it safe to encrypt backups?
Yes, encrypting backups is essential for their security and protection. Encryption ensures that even if backups are accessed without permission, their contents remain confidential.
Is Backblaze zero knowledge?
Backblaze offers zero-knowledge encryption, but it's off by default and must be enabled through the desktop app
Sources
- https://www.backblaze.com/cloud-storage/security
- https://www.backblaze.com/blog/server-side-encryption-keys-to-more-protection/
- https://www.backblaze.com/computer-backup/docs/configure-security-settings-mac
- https://www.backblaze.com/docs/cloud-storage-enable-server-side-encryption-with-the-native-api
- https://www.pcmag.com/reviews/backblaze
Featured Images: pexels.com