When you think about decentralized storage, privacy is usually the first concern that comes to mind. You’re trusting a distributed network of independent operators with your data, so the obvious question is: what exactly can they see? As you look at Walrus, this question becomes even more important because its architecture is designed for availability and integrity first. That design choice naturally raises a deeper, more nuanced discussion around encryption, defaults, and user responsibility.
Let’s unpack this carefully, without assumptions or hype.
What Walrus Encrypts — and What It Doesn’t
At the protocol level, Walrus does not automatically encrypt data before distributing slivers across storage nodes. Instead, Walrus focuses on structural privacy rather than cryptographic privacy by default.
When you upload a file to Walrus, it is broken into erasure-coded slivers using the Red Stuff encoding scheme. Each storage node receives only a fragment of the original blob, and no single node can reconstruct the full file on its own. This already provides a meaningful privacy baseline: operators do not see complete files, only mathematically useless pieces unless a quorum is combined.
However, it’s important to be precise here. Erasure coding is not encryption. A determined adversary controlling enough shards could theoretically reconstruct the data. Walrus is explicit about this boundary. Confidentiality is not enforced automatically by the protocol; it is intentionally left as a user-managed layer.
This separation is not a weakness. It’s a design decision.
Why Walrus Treats Encryption as Optional
If you step back and think about the use cases Walrus targets—data availability for rollups, public assets, websites, NFT media, and application frontends—mandatory encryption would actually be counterproductive in many scenarios.
Walrus is built to be a neutral, verifiable storage layer. Its core responsibilities are:
Ensuring data remains available even under node failures
Proving that data is still stored through availability proofs
Maintaining integrity over long time horizons
Encryption, by contrast, is about who is allowed to read the data. That question varies wildly depending on what you are building.
By keeping encryption optional, Walrus allows you to decide:
Whether your data should be public, private, or conditionally accessible
What encryption scheme you trust
How keys are generated, stored, rotated, or revoked
This modular approach avoids locking developers into a single confidentiality model that may not fit their application.
Your Responsibility as a User or Developer
Because encryption is not enforced by default, you are responsible for encrypting sensitive data before uploading it. In practice, this is straightforward. You can encrypt files client-side using standard cryptographic libraries before submitting them to Walrus. The network will then store and serve encrypted blobs exactly as it would plaintext ones.
From a practical standpoint, this means:
Storage nodes never see readable data
Availability proofs still work, because they operate on encoded slivers, not plaintext
You retain full control over keys and access policies
This approach aligns well with modern security thinking: encryption at the edges, not enforced blindly at the infrastructure layer.
What About Walrus Sites?
This is where defaults matter most, and where many people get confused.
Walrus Sites are designed to serve public content. Think websites, application frontends, documentation, media assets—things you want people to fetch without friction. In this context, encryption by default would break the entire model.
So the default for Walrus Sites is unencrypted, publicly readable content.
That doesn’t mean it’s unsafe. It means it’s intentionally transparent.
Files are still erasure-coded and distributed
No single node hosts the full site
Integrity is enforced cryptographically
Availability is continuously proven
But the content itself is meant to be accessible. This mirrors how traditional web hosting works, except without relying on a single server or provider.
If you want restricted access, encrypted content, or gated delivery, that logic belongs above Walrus Sites—through application-level encryption, access control layers, or key-managed delivery systems.
Why This Model Is More Honest
One thing I appreciate about Walrus is that it doesn’t pretend to solve every security problem at once. Instead of marketing “privacy by default” in a vague way, it draws a clear line:
Walrus guarantees availability and integrity
You decide confidentiality
This clarity helps you reason about risk properly. You’re not lulled into a false sense of security by assumptions that encryption is happening somewhere invisibly. If your data needs to be private, you encrypt it. If it’s meant to be public, you don’t.
That transparency is rare—and valuable.
How This Fits Into the Broader Ecosystem
This design also makes Walrus a strong foundation for higher-level privacy systems. Encrypted storage overlays, confidential data markets, and zero-knowledge access schemes can all be built on top of Walrus without modifying its core protocol.
In other words, Walrus doesn’t compete with encryption frameworks—it enables them....
You can think of it as a reliable, censorship-resistant hard drive for the decentralized world. Whether the files on that drive are readable or encrypted is up to you.
Final Reflection
If you’re evaluating Walrus through the lens of privacy, the key takeaway is simple but important: Walrus does not encrypt your data for you, and it doesn’t pretend to. Instead, it gives you a robust, verifiable storage substrate and leaves confidentiality in your hands.
For public content like Walrus Sites, this is the right default. For sensitive data, encryption is expected—and fully compatible.
That separation of concerns makes Walrus more flexible, more honest, and ultimately more useful for a wide range of real-world applications. You’re not boxed into a single privacy model; you’re given the tools to choose the one that actually fits what you’re building.

