Securing Your Data Like Never Before



Cloud Distributed System

YOTTACUBE Re-Inventing cloud storage without the need of large data centres

YottaCube is a decentralised cloud operating system the comprises of a network connected storage device and a software solution, the users store their data on the Yotta system knowing their data is safe and secure.
File Storage

File Storage

Upload and share data files

Decentralised Security

Decentralised Security

Know where your data is by specific country and only you has access

AES 256 Encryption

AES 256 Encryption

AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm.

Private Encryption Keys

Private Encryption Keys

Securing your data even if your systems are accessed the data remains safe.

Data shredding

Data shredding

The data is shredded into 8 before encryption then stored.

GDPR Compliant

GDPR Compliant

In 2018 GDPR will be a LEGALLY required standard for all UK businesses for data security.


Gary Spence CEO - Founder
Gary Spence

Gary Spence

CEO - Founder

Andrew Latchford

Andrew Latchford

CTO - Co-Founder

Tony Xhufi

Tony Xhufi

CMO - Business Development


YottaCube - Taking data security to a whole new level.


YottaCube a virtual data cloud management (Blockchain) Service system that offers an affordable value, proactive compliance suite. Our Specialism started within in the supply chain industry with further expansion to ALL legislated sectors. A genuine decentralised eco-system that offers the true piece of mind for data security. A decentralised cloud storage network implementing encryption of which would allow users to transfer and share data without reliance on a third party data provider. The removal of central controls would eliminate most traditional data failures and outages, as well as significantly increasing security, privacy, and data control. A peer-to-peer network and encryption system as a solution of which provides scaleability and also allows small businesses the same level of data security as large corporates, We propose a solution to these additional problems by using a bespoke algorithm and to build a low-cost efficient on-line blockchain, Smart Contract management system. To increase their compliance. The benefit to businesses is an affordable subscription payment, with both virtual and physical support. Cloud storage on the Internet has come to rely almost exclusively on data providers serving as trusted third parties to transfer and store the data. While the system works well enough in most cases, it still suffers from the inherent weaknesses of the trust-based model. Because end-to-end encryption is none standard, the traditional cloud is open to a variety of security threats, including man-in-the-middle attacks, malware, and application hacks that expose sensitive and private consumer and corporate data. Furthermore, current cloud storage applications are able to charge large premiums on data storage over their core costs because users have few interoperable and featureful providers to choose from. Moreover, these third party providers may have technical failures that can cause data breaches and unavailability, much to the distress of the users and applications that depend on them. The YottaCube offers to eliminate these issues by decentralizing the system and raiding it by ^4, ^8 and ^16 add this with SHA3-512 or SHAKE256 this ensures near impenetrable offering the highest of security. YottaCube has developed a model of revenue generation in this sector, which includes production and distribution of bespoke units and a customer product of service. This will be sold to a number of channels and have legal status recognition.

Personal Info

  •   +44 1782 365270
  •   Staffordshire UK



We are currently seeking investors to create a truly global decentralised safe and secure cloud system. Contact For more information.

GDPR 2018

IntroductionWho does the GDPR apply to?What information does the GDPR apply to?
This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organisations understand the new legal framework in the EU. It explains the similarities with the existing UK Data Protection Act 1998 (DPA), and describes some of the new and different requirements.

When we started drafting this overview, the GDPR was on track to apply in the UK from May 25 2018 and organisations would have to comply with it from that date. The ICO had started to produce a set of guidance on GDPR, and this overview was to be the first substantive part of that. The result of the 23 June 2016 referendum on membership of the EU now means that the Government needs to consider the impact on the GDPR.

However, we still think it will be useful to publish this overview. This is because once implemented in the EU, the GDPR will be relevant for many organisations in the UK – most obviously those operating internationally. The other main reason is that the GDPR has several new features – for example breach notification and data portability. Therefore we thought it would still be useful to familiarise information rights professionals with the GDPR’s main principles and concepts.

With so many businesses and services operating across borders, international consistency around data protection laws and rights is crucial both to businesses and organisations, and to consumers and citizens. The ICO’s role has always involved working closely with regulators in other countries, and that will continue to be the case. Having clear laws with safeguards in place is more important than ever given the growing digital economy, and we will be speaking to government to explain our view that reform of UK data protection law remains necessary.

This overview is for those who have day-to-day responsibility for data protection.

  • The GDPR applies to ‘controllers’ and ‘processors’. The definitions are broadly the same as under the DPA – ie the controller says how and why personal data is processed and the processor acts on the controller’s behalf. If you are currently subject to the DPA, it is likely that you will also be subject to the GDPR. 

    If you are a processor, the GDPR places specific legal obligations on you; for example, you are required to maintain records of personal data and processing activities. You will have significantly more legal liability if you are responsible for a breach. These obligations for processors are a new requirement under the GDPR.

    However, if you are a controller, you are not relieved of your obligations where a processor is involved – the GDPR places further obligations on you to ensure your contracts with processors comply with the GDPR.
  • The GDPR applies to processing carried out by organisations operating within the EU. It also applies to organisations outside the EU that offer goods or services to EU citizens.
  • The GDPR does not apply to certain activities including processing covered by the Law Enforcement Directive, processing for national security purposes and processing carried out by individuals purely for personal/household activities.
Personal data

Like the DPA, the GDPR applies to ‘personal data’. However, the GDPR’s definition is more detailed and makes it clear that information such as an online identifier – eg an IP address – can be personal data. The more expansive definition provides for a wide range of personal identifiers to constitute personal data, reflecting changes in technology and the way organisations collect information about people.

For most organisations, keeping HR records, customer lists, or contact details etc, the change to the definition should make little practical difference. You can assume that if you hold information that falls within the scope of the DPA, it will also fall within the scope of the GDPR.

The GDPR applies to both automated personal data and to manual filing systems where personal data are accessible according to specific criteria. This is wider than the DPA’s definition and could include chronologically ordered sets of manual records containing personal data.

Personal data that has been pseudonymised – eg key-coded – can fall within the scope of the GDPR depending on how difficult it is to attribute the pseudonym to a particular individual.

Sensitive personal data

The GDPR refers to sensitive personal data as “special categories of personal data” (see Article 9). These categories are broadly the same as those in the DPA, but there are some minor changes.

For example, the special categories specifically include genetic and biometric data, where processed to uniquely identify an individual.

Personal data relating to criminal convictions and offences are not included, but similar extra safeguards apply to its processing (see Article 10).

For full information -



Blockchain technology is a decentralized ledger of digital asset ownership on which the asset owners, or users, can initiate transfer to other users whose interconnected computers run blockchain software (“nodes”). The transactions themselves are encrypted transfer data that, when confirmed comprise the “blocks” and when linked sequentially to the referenced prior block, comprise the “chain.” Confirmation occurs when the first of these nodes, each of which maintains a current copy of the blockchain, verifies the transaction(s) by utilizing specialized computational software to solve a complicated encryption problem. Then, and only then, does this node add the new block sequentially into the chain, causing the other nodes to validate the solution and update their ledgers accordingly. This veri cation yields compensation to the problem-solving node, a “miner,” for the processing power expended in first successfully confirming the transaction. In the case of YottaCube the blockchain is used to confirm conformity before the data is distributed NO data is stored in a blockchain it is only used to confirm the actions.
Nesciunt tofu stumptown aliqua, retro synth master cleanse. Mustache cliche tempor, williamsburg carles vegan helvetica. Reprehenderit butcher retro keffiyeh dreamcatcher synth. Cosby sweater eu banh mi, qui irure terry richardson ex squid. Aliquip placeat salvia cillum iphone.
Raw denim you probably haven't heard of them jean shorts Austin. Nesciunt tofu stumptown aliqua, retro synth master cleanse. Mustache cliche tempor, williamsburg carles vegan helvetica.
Without Blockchain, storing, sharing and disseminating data and information is always a risk. Every interaction that every single person does online relies on some trusted centralised authority, and no matter what action you are completing online, you are putting your trust in someone else or some other source to be reliable and trustworthy. Until the advent of Blockchain, society depended on the “trusted hub” to have processes in place to prevent hacking, manipulation and breach. An example of this would be how banks collect, store and disseminate data to individual customers. You receive your account statement online or are able to do things like make transfers, get your balance, etc. But what’s to stop your banking institution from making a mistake, providing false information or simply not providing the level of security needed to prevent personal data from being leaked? Unlike other currencies and payment networks, Blockchain is not controlled by a bank or the government. On the contrary, thousands and thousands of computers around the world independently verify encrypted transactions and manage a decentralized ledger of every transfer on the network. This ledger can be accessed online by anyone. But the key element with Blockchain is that while records can be added to the ledger, no existing transactions can be changed or removed.
Blockchain is essentially a continuously growing record or ledger of digital events that is shared among many different parties. It can only be updated by a consensus of the majority of the participants in the system and cannot be altered or erased once entered. In essence, Blockchain is a permanent record that cannot be corrupted. Blockchain removes the need for trust in any third party, as every device involved in the public ledger must work to reach a consensus.
YottaCube is a decentralised cloud operating system the comprises of a network connected storage device and a software solution, the users store their data on the Yotta system knowing their data is safe and secure. The data is shredded into eight then encrypted with a 256 password key before it is distributed across the Yotta system. This is completely unique as not only do we have our own storage but we control which countries the data is stored, unlike any competitor.