Bytes can be encrypted with your own public key, but also a second layer could be added to encrypt for a storage provider. This will result in a separate hash, and improve proof of replication, since it reduces the risk of de-duplication (multiple providers colluding to keep data in one place, and then relaying slice challenges).
Bytes can be encrypted with your own public key, but also a second layer could be added to encrypt for a storage provider. This will result in a separate hash, and improve proof of replication, since it reduces the risk of de-duplication (multiple providers colluding to keep data in one place, and then relaying slice challenges).