Introducing Logos Storage: Decentralized Storage for the Logos Tech Stack

In “Understanding the Logos Tech Stack” we described Logos as an operating system — a kernel, a networking layer, and modules that together provide the infrastructure for self-sovereign applications. In “Building on Logos Core” we showed how those modules are built, packaged, and distributed.

This article goes deep on one of the three foundational modules: Logos Storage — the decentralized storage and data persistence layer for the Logos tech stack. What it is, what it’s designed to do, how it fits into the broader architecture, and what you can use today.


Why Decentralized Storage

Every meaningful application needs to store data. Today, that overwhelmingly means centralized cloud providers — AWS, Google Cloud, Azure. The trade-off is familiar: convenience in exchange for control. Your data lives on someone else’s servers, subject to their terms of service, their jurisdictional obligations, and their business model.

Decentralized storage projects — IPFS, Filecoin, Arweave — address the control problem. They distribute data across a network of independent nodes, remove single points of failure, and make censorship harder. This is real progress.

But they introduce a new problem: privacy. Decentralized storage as it exists today is transparent by default. IPFS broadcasts who is storing what and who is requesting what. Filecoin’s on-chain deals are public records. The network layer leaks metadata that centralized providers at least have the option of shielding behind access controls.

Decentralized storage without privacy is surveillance infrastructure with extra steps.

Logos Storage — formerly known as Codex — is built on a different premise. Privacy is not a feature to be added later; it is a design constraint that shapes the protocol from the ground up.


What Logos Storage Is

Logos Storage is a peer-to-peer storage protocol designed to provide durable, censorship-resistant data persistence with built-in privacy guarantees. It serves as the storage layer for the Logos tech stack, handling everything from application asset delivery to long-term data archival.

At its core, the system is built on content-addressed blocks. When you store a file, it is split into fixed-size blocks, organized into a Merkle tree for integrity verification, and distributed across storage providers. Retrieval reverses the process: request blocks by their content identifiers (CIDs), verify them against the Merkle root, reconstruct the original file.

This architecture serves three primary functions within the Logos ecosystem:

  1. Module storage and delivery. Logos Core modules — the building blocks described in the modular architecture article — need to be stored, versioned, and distributed. Logos Storage provides the decentralized backend for this.
  2. Application data persistence. Any application built on Logos — a chat client archiving message history, a DeFi app storing state, a web application serving assets — uses Logos Storage as its data layer.
  3. General-purpose file storage. Store a file, get back a CID. Provide a CID, get back the file. The simplest use case, and the one available in testnet v0.1 today.

The Architecture

Logos Storage is built on three foundational primitives. Together they define how data enters the network, how it is organized for integrity verification, and how it can be found again.

Content-addressed blocks. When you store a file, it is split into fixed-size blocks. Each block is identified by its content hash — a CID. This means storage is inherently deduplicated and verifiable: a block either matches its identifier or it doesn’t. There is no ambiguity, no central authority deciding what counts as authentic.

Merkle trees. All blocks are organized into a Merkle tree, where each leaf is a block and the root hash serves as the content identifier for the complete dataset. This structure enables efficient integrity verification: a client downloading a single block can verify it against the Merkle root without downloading the entire dataset. A manifest accompanies each dataset, containing the Merkle root, block layout, and metadata needed for retrieval.

Content discovery via DHT. Storing data is only useful if you can find it again. Logos Storage uses a Kademlia Distributed Hash Table (DHT) for content discovery — the same class of DHT used by IPFS, BitTorrent, and other large-scale decentralized systems. The DHT maps CIDs to the providers storing them. When a client wants to retrieve a file, they query the DHT with the CID and receive a list of providers who hold the relevant blocks. The Kademlia topology provides logarithmic routing — in a network of N nodes, any content can be located in O(log N) hops. The DHT also handles peer discovery, allowing new nodes to find and join the network without centralized bootstrap servers.

These three components — content addressing, Merkle-based integrity, and distributed discovery — are the foundation. Getting them right, and building privacy into each layer, is the work of testnet v0.1.


Privacy by Design

This is where Logos Storage diverges most sharply from existing decentralized storage systems.

Standard decentralized file sharing leaks metadata at every stage:

Discovery. To find which peers hold a file, you query the DHT. The DHT now knows what you’re looking for. In a sufficiently observed network, the pattern of queries is equivalent to a download log.

Transfer. When you download blocks from a storage provider, the provider knows your IP address, which CIDs you requested, and the timing of your requests. Even with transport encryption, the traffic pattern is distinctive.

Publishing. When you upload a file, the storage providers know who stored it. If the content is later deemed sensitive, you are identifiable as the source.

Logos Storage is designed to address all three leakage points:

  • Anonymous retrieval. File requests are routed through the Logos mix-net — the same anonymous communication layer that protects messaging traffic across the Logos stack. Rather than connecting directly to a storage provider, requests are wrapped in layers of encryption and forwarded through a sequence of mix nodes. This is not onion routing; mix networks add cover traffic and timing delays to defeat traffic analysis even against adversaries observing the network’s edges. A draft approach for anonymous downloads has been published and is being developed in collaboration with the AnonComms team.
  • Anonymous publishing. Hidden services over the mix protocol will allow storage providers to serve files without revealing their network identity. This is the next research target after anonymous downloads.
  • Query privacy. DHT queries are being designed to protect query content and source identity, preventing the discovery layer from becoming a surveillance tool.
  • Encrypted metadata. Manifests and metadata are encrypted, so storage providers hold blocks without knowing what the content is or who it belongs to.

A comprehensive privacy analysis of Logos Storage’s file-sharing components has been completed and is under review. This analysis maps every component of the file-sharing pipeline to its privacy requirements — identifying exactly where metadata leaks, what the threat model looks like, and what mitigations are needed.

Privacy is not a future feature. It is the architectural constraint that drives every design decision.


How It Fits Into the Logos Stack

Logos Storage doesn’t exist in isolation. It’s one layer in a stack designed to work together.

Recall the Logos architecture: a microkernel at the base, a networking layer (with mix-net privacy) above it, modules providing capabilities, and applications on top. Logos Storage is a module — specifically, one of the three foundational modules alongside Messaging and Blockchain.

This integration matters in several concrete ways:

The module system. Logos Storage runs as a Logos Core module (logos-storage-module). It loads through LibLogos, communicates with other modules through the kernel’s IPC layer, and follows the same build-package-distribute pipeline described in the modular architecture article. Developers interact with it through the standard logos.storage.<method> API pattern, the same convention used for every other module.

The networking layer. Storage traffic flows through the Logos networking stack, which means it benefits from the mix-net’s privacy guarantees. File retrieval can be routed through mix nodes; capability discovery lets storage nodes find each other without centralized infrastructure.

The blockchain. The blockchain layer provides the on-chain foundation for future storage economics — storage contracts, proof verification, and incentive alignment. How exactly the storage and blockchain modules interact at this level is still being worked out, but the intent is clear: if the blockchain module handles on-chain persistence and compute, the storage module handles offline persistence — the data that lives outside the ledger but still needs durability guarantees.

Applications. At the top of the stack, applications compose these modules. The simple filesharing app in testnet v0.1 uses the storage module directly. Future applications will use it for asset hosting, data persistence, module distribution, and more.


What You Can Use Today

Testnet v0.1 is where Logos Storage becomes tangible. The focus of the initial testnet is testing backends — not polished UX, but working infrastructure.

The Simple Filesharing App

The Logos App includes a simple filesharing application that demonstrates the storage module:

  • Store a file — select a file, upload it to the network, receive a CID.
  • Retrieve a file — enter a CID, download the file.

This is the basic content-addressed storage loop. It works today.

The Storage Module API

Developers can test the storage module directly through its API. The module runs as a Logos Core module, loadable through LibLogos in either UI or headless mode. Headless mode is suitable for server deployments, CLI tools, and automated pipelines.

For C and C++ developers, easylibstorage provides a lightweight wrapper with examples for uploading, downloading, and interacting with the storage API. The storage module itself provides C bindings for integration into any application running on LibLogos Core.

The Storage Node

The Logos Node — the headless runtime — can load and start a storage node alongside blockchain and messaging nodes. This is the infrastructure mode: run a node, contribute storage to the network, and test the protocol in a real decentralized environment.

What’s Not Yet Available

Privacy features — anonymous downloads via the mix-net, anonymous publishing through hidden services — are in active research with published drafts, but are not yet integrated into the testnet. Rate-Limiting Nullifiers (RLN), the zero-knowledge system that will prevent spam in anonymous retrieval, is being developed in collaboration with the AnonComms team and is a cross-cutting effort shared with the messaging and blockchain layers.

Durability mechanisms — erasure coding, storage proofs, and an economic marketplace for incentivizing storage providers — are part of the longer-term design space. The focus right now is on getting the foundational file-sharing protocol right: content addressing, Merkle integrity, discovery, and privacy. What gets built on top of that foundation, and in what form, will be shaped by what we learn from the testnet.


What Comes Next

Logos Storage is being built from the foundations up — the core file-sharing protocol first, then privacy integration, then whatever economic and durability mechanisms the testnet demonstrates are needed.

The immediate priorities:

  • Privacy integration. The anonymous download approach using the mix protocol has a published draft. Hidden services for anonymous publishing are next. The completed privacy analysis provides a concrete map of what needs to be built and where.
  • Ecosystem integration. Deeper integration with the Logos module system, packaging, and application data persistence patterns as the stack matures.
  • Learning from the testnet. The v0.1 testnet is a beginning. The variety of persistence needs — short-lived caching, long-term archival, module distribution, application state — each has its own requirements. The right mechanisms for meeting those needs will be shaped by real usage.

The goal is a storage layer where the foundations work: data is content-addressed and verifiable, discovery is functional, and privacy is built in — not bolted on. What gets built on top of those foundations will be determined by what the ecosystem actually needs.


Sources

Code & Tools

Specs

Research & Privacy

Context

  • “Understanding the Logos Tech Stack: An Operating System for Sovereignty” — press.logos.co
  • “Building on Logos Core: The Modular Architecture and Package Manager” — press.logos.co
  • Testnet v0.1 scope: Logos roadmap