Medullar Blog|Posted in: Medullar Spaces Security

Why Medullar is one of the Safest Places to Store Your Knowledge

When protecting sensitive information, Medullar takes security to the next level. Here's why:

How Medullar Handles Your Knowledge

When you upload a file, note, audio, image, or any other data into a Medullar Space, the file itself is never stored; we do not keep a copy. Instead, Medullar employs advanced technology to process and secure the knowledge contained within your files. Here's how it works:

  • Tokenization and Chunking: Using a tokenizer, your file is broken down into smaller chunks. For instance:
    • A text document about market trends might be split into several paragraphs or sentences.
    • An audio file could be transcribed and divided into meaningful segments.
  • Embedding and Vectorization: Each chunk is converted into an embedding, a mathematical representation that captures its meaning and context. Think of embeddings as highly advanced summaries of the knowledge in a chunk, designed for machines to understand.
    • For example, "Artificial Intelligence in Healthcare" might become a series of numbers like [0.25, -0.76, 0.10...].
    • These embeddings allow Medullar to find similar or related information efficiently.
  • Storage in a Vector Database: The embeddings are then stored in a vector database. Unlike traditional databases that store raw text or files, vector databases store embeddings along with the knowledge, making it possible to retrieve knowledge quickly and accurately based on its semantic meaning.

Layered Security at Every Step

Medullar doesn't just store these embeddings with the knowledge—it secures them with military-grade encryption (AES-256). Here's what makes our approach unique:

  • Unique Encryption Keys for Each Workspace: Every workspace in Medullar has its encryption key. If the same file is uploaded into two different workspaces, the vector database will store different encrypted data for each workspace. This ensures that knowledge in one workspace remains wholly isolated and inaccessible from another.
    • Example:
      • Workspace A: The chunk from your file might encrypt to 2sf83&!8d in the database.
      • Workspace B: Using a different key, the same chunk could look like j7#kL@3a.
  • Encryption at Rest: Even data's physical storage is encrypted, ensuring that no one—not even Medullar—can access the raw knowledge without the encryption key.

Double Encryption: The stored knowledge is encrypted twice, once by the storage system and again within the vector database.

Why This Matters for Your Security

  1. Files Remain Private: Since Medullar doesn't store your files, only their knowledge, your sensitive data stays out of reach of anyone who doesn't have access to the original file.
  2. No Shared Keys: The unique encryption key for each workspace means data in different workspaces is entirely independent. Even if someone could access the database, they would encounter meaningless encrypted bytes without the correct key.
  3. End-to-End Protection: From the moment your file is uploaded to its processing and finally to its knowledge storage, Medullar employs encryption and strict access controls to ensure your data stays secure.

Examples in Action

  • Scenario 1: Collaborative Knowledge Sharing: You upload a research document on renewable energy into a Medullar Space shared with your team. Medullar extracts key insights chunks the text and stores the embeddings in its vector database. The original file remains on your device or cloud; only the encrypted embeddings are stored.
  • Scenario 2: Multiple Workspaces: You upload the same renewable energy document into two workspaces—one for a corporate team and another for a community project. While the knowledge is the same, the vector database stores two entirely different sets of encrypted data due to the unique encryption keys of each workspace.

Why Medullar is Super Secure

At Medullar, we don't just claim to prioritize security—we build it into every layer of our system:

  • Files Stay with You: We store knowledge, not files.
  • Unique Encryption Keys: Each workspace has its key, ensuring complete data isolation.
  • Advanced Technology: Vector databases and embeddings ensure efficient, meaningful, and secure storage.
  • Multiple Encryption Layers: Knowledge is encrypted at rest and within the vector database.

With Medullar, you can trust that your knowledge is safe, secure, and only accessible to those you share it with: your knowledge, your control, your security.