Get your organisation off the cloud and into perpetual data. Indelible wraps Autonomi in a familiar stack, so you can migrate datasets without the big rewrite.

Get your organisation off the cloud and into perpetual data. Indelible wraps Autonomi in a familiar stack, so you can migrate datasets without the big rewrite.

The Cloud is Dead, Long Live the Data

The Cloud is DeaD
Long Live the Data

Your Gateway to Autonomi

Your Gateway to Autonomi

Familiar interfaces, decentralized underneath

REST API, OIDC/SSO, SCIM provisioning, audit logs, quotas, role-based access. Indelible looks like the storage tooling your team already runs.

Built for teams, departments, and groups

Designed for organizations: Admin roles, group permissions, shared collections, scoped API tokens for CI pipelines, and SCIM provisioning that follows your identity provider. Multiple contributors, one source of truth.

Start your cloud exit

Pay once per upload: no monthly bills, no per-GB egress fees, no vendor relationship to renegotiate every two years. Indelible is a way off the treadmill of recurring costs.

Inside Indelible

Inside Indelible

What's in the box

What's in the box

REST APIs

Full Swagger docs, idempotency keys, cursor pagination, structured errors.

Access Control

OIDC/SSO with Okta, Entra, Google. SCIM 2.0, JWT sessions, scoped API tokens.

Admin Interface

Embedded Vue dashboard for users, wallets, quotas, audit logs, and settings.

Ops & Monitoring

Audit logs, webhooks with HMAC, configurable rate limits, disk-space monitoring.

Data Management

Hierarchical collections, label-selector tags, bulk operations, auto-tag rules.

Cost Control

Multi-wallet, per-user / per-group / per-department quotas, live cost quotes.

Built to host

Single Go binary, SQLite or Postgres, Docker Compose. Works behind your reverse proxy too.

Decentralized & Immutable

Built on the Autonomi Network

Indelible writes to the Autonomi Network — a peer-to-peer storage layer with no central operator. Files are encrypted at your network's edge, split into chunks, and distributed across thousands of independent nodes. Pay once per upload; the data persists for the life of the network.

Cryptography

Encryption — ChaCha20-Poly1305, 256-bit keys

Key exchange — ML-KEM-768

Authentication — ML-DSA-65

Content addressing — BLAKE3 hashing

The decentralized data layer for the agentic era. Post-quantum secure, permanent, and built to run when the internet doesn’t.

The decentralized data layer for the agentic era. Post-quantum secure, permanent, and built to run when the internet doesn’t.

The decentralized data layer for the agentic era. Post-quantum secure, permanent, and built to run when the internet doesn’t.