In an age of eroding online privacy and increasing corporate surveillance, many are looking for a good alternative to Google Drive for their documents and files. After all, why would you want to store your private data with the worlds largest advertising company? This is especially true when you consider that Google has a financial incentive to collect and analyze your data.
Editors Note:Guest author Heinrich Long is the editor behind Restore Privacy, a blog dedicated to inform about best online privacy practices, secure your electronic devices, unblock restricted content and defeat censorship.
Even if finding a good Google Drive alternative has not been a top priority, it is another service worth replacing if you are planning to fully restore your privacy. And by selecting a reliable and secure Google Drive alternative, you will have more control of your data. You will also be supporting some great privacy-focused businesses while steering clear of surveillance capitalism.
First, we do need to point something out. Google Drive keeps your data secure against outsiders. However, this is a distinction from privacy. Thats because Google themselves can read your data if they wish. Here is what the Google Drive Additional Terms of Service, dated March 31, 2020, has to say on the subject (emphasis added):
We may review content to determine whether it is illegal or violates our Program Policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law. But that does not necessarily mean that we review content, so please dont assume that we do.
What? It seems to be saying that they want you to act like your data is private even though they can look at it whenever they feel the need to do so. We dont actually provide privacy but you should pretend that we do?
Unless you are part of an organization where you are required to use Google Drive, it should be relatively easy to switch to a more private cloud storage service. Replacing it will be an easy step toward a long-term goal of replacing all your Google apps and services.
Finding a secure cloud storage service takes on more importance when you think about all the sensitive data you are storing in the cloud. Add in the number of nasty cloud storage hacks that have occurred over the years and you might start feeling a sense of urgency.
Moving away from Google Drive is complicated by the fact that it works with various other services such as Google Docs, Calendar, and more. If you use the full suite of Google apps, replacing Drive could be challenging. However, if you have some flexibility in the additional apps and services you use, I can show you some secure cloud storage options that can act as Google Drive alternatives that also keep your data private.
Tresorit is our pick for the best Google Drive alternative today. It offers a full set of features that could be useful for individuals and teams, as well as businesses. You also get end-to-end zero knowledge encryption that ensures your data is really private and secure even from the people at Tresorit.
If you are on an individual plan, your data will be stored in Ireland. But if you spring for a business account, you can select from several jurisdictions to meet your regulatory and business requirements. Tresorit has also been audited to confirm that the product delivers on its promises. Ernst & Young did it in 2019 and rated Tresorit as a trustworthy service.
Tresorit doesnt connect to the same range of business apps that Google Drive does, but it does integrate with Outlook, Gmail, and Active Directory, making it easy to use Tresorit with your existing infrastructure.
Their business-oriented plans also give you tools for managing users and their data across the organization. When you factor in Tresorit compliance with HIPAA, GDPR, FedRAMP, and numerous other data protection regulations, you get a secure cloud storage offering that works in a business environment.
Tresorit isnt just resting on its past achievements, either. One recent addition to the product was Tresorit Drive 2.0. Tresorit Drive allows you to access and edit cloud-only files without downloading or syncing them. It is available for Windows and Mac OS.
Tresorit is a great Google Drive replacement for business users but might be overkill for individual users. The free plan offered by the company is very limited, while individuals will probably have little use for the business features while still needing to pay the products relatively high subscription fee.
Note: Effective July 6, Swiss Post acquired a majority stake of Tresorit. According to the company, the acquisition wont change much from the perspective of users like you and me. Well keep an eye on the situation and let you know if anything significant comes up. Check out Restore Privacy's complete Tresorit review.
This Canadian company is one of the best alternatives to Google Drive for both individuals and businesses. The service has a zero-knowledge infrastructure that looks really solid and features that will appeal to any audience. The Sync.com free plan could be ideal for individuals who can get by with only a few gigabytes of storage (5 GB) and dont need a Linux sync client. The company stores all your data in Canada.
Sync.com has a number of strong features for businesses. It has capable subscription plans with the ability to do things like view Office documents directly from the web, send and receive files securely, as well as unlimited storage and bandwidth. The plans are compliant with industry standards such as HIPAA, GDPR, and PIPEDA.
Sync.com provides a range of file sharing options.
There are two potential drawbacks to consider if you want to use Sync.com for business. One is that you need to store all your data in Sync.coms Sync folder. This could result in incompatibilities with other crucial business apps and services. The other potential drawback is that the company has not published any third-party audit results yet. Learn more about this Google Drive alternative in Restore Privacy's Sync.com review.
If you use Google Drive as an individual, rather than a team member or an employee, MEGA could be the Google Drive replacement you want. Among its Drive-like benefits, MEGA provides desktop and mobile clients for every major operating system, including Linux.
Like Tresorit, MEGAs end-to-end, zero knowledge encryption means not even MEGA themselves can read your data. They also offer a generous free plan that includes 15 GB of storage (which you can boost to as much as to 50 GB if you complete certain tasks). One thing that hurts this service is that it has daily data transfer limits that can leave changes unsynced until the next day if you try to move too much data at once.
While MEGA has a lot to offer for individuals, it doesnt look as good if you are looking for secure business storage. Their business plans can include unlimited storage and transfer capacity, plus built-in chat, contacts, and file preview capabilities. But Tresorit and other services like pCloud have stronger corporate offerings.
Another thing to be aware of with MEGA is that New Zealand law forces MEGA to include some worrying clauses in their ToS. Youll want to study the ToS extra carefully if you are considering MEGA for corporate cloud storage. Learn more in Restore Privacy's MEGA cloud storage review.
Compared to the other Google Drive alternatives were looking at here, NordLocker is pretty bare bones. Thats because it is really a file encryption system with cloud storage capabilities. If you are looking for secure Google Drive replacement, the NordLocker Premium plan offers 500 GB of storage at a very reasonable price.
Consider NordLocker for business or personal use if you need the maximum possible security for your cloud storage. Conventional secure cloud storage services like Tresorit or Sync.com encrypt your data whenever it is in motion or when it is on their servers. No one, not even them, can decrypt your data in these circumstances.
But conventional cloud storage services do not encrypt the data when it is at rest on your devices. If a malicious actor gains access to your device, they will also have full access to your files as well.
NordLocker gives you the flexibility to create encrypted lockers on your device or in the cloud.
NordLocker eliminates this problem. You put files and folders you want to store in the cloud into a special folder called a locker. Lockers are encrypted by default, even on your device. Unless you open NordLocker (which is password-protected) your files remain safely encrypted at all times. This results in an additional level of protection beyond the other products profiled here.
NordLocker has one other nice trick on offer. The service provides its own secure cloud storage for lockers just like everyone else. But NordLocker lockers are also compatible with any other cloud storage service. Thats a big deal. It means you can store lockers in other cloud storage services (including Google Drive), and know that your data is secure. Learn more about this versatile tool in Restore Privacy's complete NordLocker review.
Nextcloud is a free and open source suite of client-server software used to create and manage file hosting services. Depending on how it is configured, Nextcloud can serve as a secure cloud storage service for individuals, a functionally similar replacement for Google Drive in the enterprise, and anything in between.
If you have the technical expertise, you can host Nextcloud on your own servers, which offers the potential for a very secure configuration. Or you can use Nextcloud through a third-party service provider to eliminate setup and maintenance headaches. Nextcloud is also very versatile and expandable.
One example of this is Nextcloud Hub. The hub allows you (and your team) to:
Given what weve seen so far, Nextcloud looks like it should be one of the top Google Drive alternatives. There are, however, a couple of drawbacks. First, Nextclouds end-to-end (E2E) encryption is not fully functional yet. This makes the ability to host your Nextcloud system within a secure firewall very important.
Another issue is that you need to be alert to how secure and private each of the components you connect to Nextcloud is. Using Nextcloud as a secure and private alternative to Google Drive requires some technical experience. Even so, Nextcloud seems to have a bright future as a powerful, flexible, and free cloud storage solution once they get their E2E encryption solution completely ironed out. Heres Restore Privacy's full review of Nextcloud.
Here are some detailed answers to some of the additional questions people have about alternatives to Google Drive.
Does it matter where the company is located?
Where a Google Drive alternative is based matters. If it is based in a country that doesnt provide strong privacy protections, the company may be forced to hand over your private data to the government or other third parties. In many cases, the company will be legally required to turn over your data, regardless of what their Terms of Service or other policies say.
However, the Google Drive alternatives we recommend feature zero knowledge, end-to-end (E2E) encryption. What this means is that no one, not even the company that runs the service, can read your files. The file encryption used by modern services is believed by cryptographers to be secure against cracking by even the most powerful current computers. So while it is best if your files are never turned over to anyone, the data within them will be safe if that does happen.
There is one other thing to discuss. The fact that a snoop cant read your encrypted files doesnt necessarily mean that there is no usable data available about your files. The service may still have access to:
You should think carefully about the threats you want to protect your data against (your threat model) before evaluating alternatives to Google Drive.
Does it matter where my data is stored?
Yes, it matters. But with the secure, private cloud storage services we recommend as Google Drive replacements, it doesnt matter too much. If youve read the main article, you are now aware that your data is not always stored in the same country your cloud storage service is located in. For example, Tresorit is based in Switzerland, but it stores your data in Ireland or various other countries. Meanwhile, Sync.com is based in Canada and stores your data there.
The laws of the country that your data is stored in can affect your data and make it available to the local government or other organizations. But once again, since the Google Drive alternatives we recommend provide strong security (Nextcloud being a current exception) the local authorities wont be able to read your files even if they do grab a copy of them. At best, they will be able to get the same kinds of metadata that we listed in the previous question.
That means that even though your data is secure in any location, if you have the option, go with a service that is both based in, and stores your data in, a privacy friendly jurisdiction.
Why cant I use a free account?
While using a free Google Drive alternative sounds appealing, there are several good reasons to pay for your secure cloud storage. They include:
The best use for a free account is to test the service. That way, you can be sure the service will meet your needs before investing money into it.
Should I use a VPN with my Google Drive alternative?
You should always use a VPN with the cloud storage service you choose as a Google Drive alternative. While secure services like those we describe prevent prying eyes from reading the data in your files, there is still metadata that can be recorded about you. Services often use your IP address to know whose metadata they have collected.
Their gathering of your personal data helps them but offers no real benefits for you. If you use a VPN to connect to a Google Drive alternative, that service wont be able to see your real IP address and location. Instead, they will see the IP address of the VPN server you are using. Since each IP address of a popular VPN is shared by many other VPN users, it will be very hard for anyone snooping on your connection to be able to associate your online activities with your online address.
Whats the difference between end-to-end encryption and zero knowledge encryption?
People are sometimes confused about the difference between end-to-end (E2E) encryption and zero knowledge encryption. Heres a quick explanation:
E2E encryption means that messages or data are encrypted before they leave your device and remain encrypted until they arrive at their destination. Theyre encrypted from one end of the connection to the other.
Zero knowledge encryption takes things one step further. With zero knowledge encryption, the user controls the encryption keys. The cloud storage service (or whatever other service you are talking about) doesnt know the encryption keys and has no way to find out what they are. In other words, the service has zero knowledge of the encryption keys and therefore cannot read your data. Period.
As mentioned earlier, a prime requirement for these cloud storage services is that they provide the privacy and security that Google Drive does not. Time and again, cloud storage services have proven to be prime targets for hackers from run-of-the-mill creeps to high-powered hacking teams backed by national governments.
Finally, take any services you like out for a test drive. Spend a few days or weeks testing it to see if it really meets your specific needs as a Google Drive alternative. Were confident that one of these will meet your needs and let you move away from Google Drive with little stress.
See the original post here:
Google Drive Alternatives: Improving Privacy and Security - TechSpot
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]