Superior and Distinctive
Cyberhood SPAN is a fully distributed and encrypted file system with real-time redundancy and fault tolerance (Secured & Protected Archive Network)

Based on the academic principle of (k,n)-threshold secret sharing scheme and built on Cyberhood's cloud-distributed system platform,
any uploaded file is randomly repackaged into n encrypted files.

Each packaged file has its own encryption key, and the file size is reduced to 1/k of the original size. Since n-k > 0, the value of n-k represents the fault tolerance number for file recovery,
which means that as long as k of the n packaged files and their corresponding keys can be retrieved, the original file can be decrypted.

*File Packaging Number (n): The number of times a file is repackaged; each packaged file will be stored on different hosts.
*Fault Tolerance Number (f, f=n-k): Represents the number of packaged files that can be damaged or lost under fault tolerance conditions.
(The fault tolerance number should be a positive integer less than or equal to half the packaging number. For example, if n=7, then 7/2=3.5, so f can be 1, 2, or 3, with 3 being the best choice)

To decrypt a file, at least k packaged files and their associated keys must be retrieved. Through the decryption algorithm, the original file can be fully recovered.




Cyberhood SPAN is a fully distributed encrypted file system with real-time redundancy and fault tolerance

Even when facing obstacles, system operation is guaranteed!


Want to learn more about SPAN packaging technology?



~ Building Critical Services on a Stable Platform ~





§ Cyberhood SPAN Features §

AI Load Balancing

( The Brain Behind the System )

The system automatically analyzes and distributes files evenly across hosts, preventing data concentration and reducing hardware read performance issues

Achieving active file storage redistribution in the shortest time to fully utilize new device space and balance the load across all devices

Anti-Damage, Anti-Corruption, Anti-Hack, Anti-Virus, Auto-Recovery

( Maximum Protection )

Data is highly encrypted and distributed across storage locations. Even if a device experiences unexpected damage or external destruction, within the fault tolerance limits, data files can still be successfully decrypted and recovered without any impact on system operation

High Fault Tolerance and Dynamic Adjustment

( Enhanced File Security )

Cyberhood SPAN's fault tolerance capability can be dynamically adjusted as devices expand. With fully encrypted data distributed across storage, simultaneous multi-device access capabilities maximize data retrieval efficiency

Double Efficiency

( Eliminate Wait Times )

Supports multiple times faster file access performance with file streaming technology, eliminating traditional file copy and backup processes.
Unlimited storage expansion with automatic load balancing after adding space




§ Flexible Deployment Plans §

Plan Name Description Use Cases
Plan A Single Server Single server operation, suitable for small requirements Small enterprises, single-point backup
Plan B Dual Server One-to-one redundancy mechanism, guarantees data safety Medium enterprises, departmental data load balancing
Plan C Three or More Servers Distributed data packaging, geographic backup High security requirement organizations (Medical, Government, R&D)

(Note 1) Plan A can automatically upgrade to Plan B or C after adding servers, depending on the number of servers added.

(Note 2) Plan B can automatically upgrade to Plan C after adding servers.


Plan A
Single Server

Plan A Single Server Diagram
Plan B
Dual Server

Plan B Dual Server Diagram
Plan C
Three or More Servers

Plan C Three or More Servers Diagram






Free Licenses: 1000 Available

1. Download ISO file and install the system following the manual steps
2. Activate your license to get formal SPAN service, Email, Contacts, Cloud Storage modules + 3 account authorizations

§ Frequently Asked Questions §


Please download the ISO file and refer to the "Installation Guide" for steps. You're also welcome to contact our customer support team through the "Official LINE".

Any equipment that meets the recommended specifications can be installed (CPU Intel i5 or higher or equivalent AMD CPU, RAM 8GB or more, HDD/SSD 500GB or more).
Regular desktop computers, even mini PCs and laptops can be installed. However, installation on laptops is not recommended, mainly because storage space is difficult to expand.

Additionally, old but functional equipment (rack servers, tower servers, PC servers, or PCs) can also be used to install Cyberhood for SPAN functionality. Since Cyberhood SPAN's fault tolerance allows users not to worry about temporary device failures, this is an economical and convenient approach. Besides SPAN function, they can also serve as ECP/ERP slaves for emergency temporary backup, which is also economically prudent, but not recommended as Master functionality.

For hosts that have already installed Cyberhood, first remove all hard drives. Connect back one of them for initial system installation, then reinstall directly using the ISO file. After system installation is complete, reconnect all other hard drives and add them using the new hard drive space method.

NAS devices that support VM (Virtual Machine) functionality and meet the recommended specifications can be installed on NAS VMs.

Additionally, NAS-like hardware devices available in the market that support multiple hard drives (2-Bay, 4-Bay, or even up to 12-Bay) for DIY NAS software installation can also be used to install Cyberhood system, without needing to install any NAS software.

Yes, this requirement involves more advanced configuration methods. Please contact our official technical support team to get the correct approach.

The license key can be directly configured and used after reinstalling Cyberhood system on the same server host, without needing to obtain a new one.

A license key is bound to a specific single host device and is bound at the time of purchase, application, or installation. Therefore, an already bound license key cannot be installed on other host devices.

If the server host device is not directly installed on a network with an external IP address (i.e., the server can directly configure an external IP address on the network interface), a basic and simple method that meets certain security requirements is to install it in the internal "first layer" LAN under a router connected to external networks (as shown below). This "router connected to external networks" gets an external network IP address via DHCP or PPPoE.


Then by using service port forwarding to enable system communication, you can use the registered domain name to connect to Cyberhood system from anywhere on the Internet.

From the date of activation, the service is valid for 180 days, including Email, Contacts, Cloud Storage modules + 3 simultaneously online accounts. After expiration, you will not be able to log in and use the service.

Please check your spam folder or promotional folder, or contact customer support for assistance.

If you install the system in IP mode, email functionality will not work properly. If you need email functionality, we recommend using domain name installation mode.