SMiD PRO: Cloud Privacy for Personal and Professional use


SMiD locks your data and keeps your keys. SMiD PRO is a small, plug and play hardware device that deeply encrypts your cloud-bound data, ensuring it remains 100% secure and confidential, round-the-clock.

  • Network Attached Storage and Cloud Security Gateway up to 5 users
  • Integrated On-Site and Off-Site Data Protection
  • Robust Encryption, immediate, automatic and round the clock

The cloud privacy solution we’ve all been waiting for

SMiD PRO is a small, plug and play hardware device that deeply encrypts your cloud-bound data, ensuring it remains 100% secure and confidential, round-the-clock. It supports the most popular cloud storage service providers, and adding more all the time. It has been designed to be an extremely user friendly solution that complies with the strictest international data protection and privacy laws, because we believe that everyone –not just big companies- should have the ability to use cloud storage with total privacy and security. Every single one of us. SMiD connects to your LAN and automatically encrypts all data right at the source.

Keep your data in the cloud for your eyes only

SMiD supports the most popular cloud storage service providers, and adding more all the time.

No one will ever see what you store in the cloud. You are the only one who holds your SMiD’s startup key- the physical key needed to activate your SMiD. It’s a completely useless device in anyone else’s hands.

SMiD is an easy-to-use hardware device that ensures automatic security of your data. It’s a much better option than other software-based encryption solutions, which are vulnerable to ransomware. SMiD keeps your system secure at all times. It reduces the attack surface, generates and manages unguessable encryption keys, and is ransomware resistant.

And the fact that SMiD is a hardware device gives it another clear advantage: simplicity. There is no software to install or configure.

We love the cloud… but we fear the cloud.

The cloud is flexible, affordable and intelligent, but in the end we have little control over who sees our data- or what they choose to do with it – when it’s stored in the cloud.

SMiD allows you to enjoy every benefit of cloud storage while keeping your data 100% secure and confidential.

Cloud flexibility. SMiD privacy. Absolute peace of mind.

All you have to do to get up and running with SMiD Pro is connect your device to your local network and set up your account through the SMiD web panel. That’s it! Once your SMiD is plugged in, everything you store in the cloud is automatically encrypted – with no risk of loss, theft, damage or intrusion.

SMiD is the first solution capable of removing all vulnerability from both cloud – and local – storage. Since no unencrypted files are ever permanently stored, you are covered against local theft or accidental loss or damage.

A new breed of cloud privacy

There’s nothing quite like SMiD on the market. It combines the best of both worlds: users get encryption as robust as enterprise-grade solutions, without the pricetag, plus the fast setup of encryption software, without having to install anything. The beauty of SMiD Pro is that it allows every cloud storage user to enjoy the full benefits of cloud, while staying in control of their data.

Box content

• SMiD Pro device
• Universal power supply with interchangeable heads
• Startup key
• Ethernet cable with RJ45 connector
• 2 SMiD safeguard keys
• Quick startup guide

Hardware Specs

• Raspberry Pi3, trademark of the Rapsberry Pi Foundation
• 64 GB storage capacity
• 10/100 Mbps Ethernet port
• 4 x USB 2.0
• Universal power supply with interchangeable heads
• FCC, CE, RoHS, WEEE compliance
• Dimensions: 90x70x25 mm

Interesting privacy facts

  • In 2012, Google received 21,389 government requests for information – affecting 33,634 user accounts. Google responded by providing the requested in 66% of the cases.
  • Fujitsu Institute Research has revealed that 88% of cloud customers are concerned with unauthorized access to their data.
  • 72% of individual user loss of information is due to hardware failures.
  • 3.1 million US consumers were victims of smartphone theft in 2013, and never recovered their data.
  • 6% of all PCs suffer an episode of data loss in any given year, and 31% of PC users have lost all of their files due to events beyond their control.

Every week 140,000 hard drives crash in US!

Questions and Answers



Q: Are there different SMiD versions?

Yes, there is a SMiD cloud security solution suitable for every kind of cloud storage user – from home-based professionals to high-security corporate departments with stringent data protection policies. But, in order to make cloud storage a viable option for everyone – we created SMiD Pro, a personal cloud storage device designed and priced for individuals or groups of up to 5 users who need to ensure that sensitive data stored both in the cloud and locally – personal information, client files, photos, legal documents, blueprints, contracts, court proceedings – is secured from prying eyes, theft, hacking or third-party misuse or mishandling.

Q: Can anyone set up SMiD Pro?

Absolutely! SMiD Pro has been designed to comply not only with the strictest international data protection and privacy laws but also to be extremely user friendly.

Q: How many SMiD devices do I need?

SMiD Pro is up to 5 users. Information encrypted by one SMiD device can only be decrypted by the same SMiD device. Use more than one SMiD to keep the privacy between departments or groups, you can share the same storage provider account for all your SMiDs. Files will be in the same storage unit but visible only to the right SMiD users.

Q: How do I set up SMiD?

SMiD comes in a small and compact box with a power cord, an Ethernet cable and a pen drive. Set up is quick and easy: Connect the device to your local network, access the SMiD web panel to set up your account and SMiD will automatically generate exclusive cryptographic keys that are simply uncrackable.

1. Set up your SMiD account and connect to selected cloud providers in the administration panel (simple type smid in your browser address bar to access it).

2. Safeguard a copy of your cryptographic keys in two USB keys (which we recommend you to store in two separate places). These keys allow you (and only you) to recover your SMiD status in case of damage to the device. That’s it. You’re up and automatically encrypting everything you store in the cloud – with no risk of loss, theft, damage or intrusion.

Q: What is the difference between SMiD and a NAS?

Working with SMiD is like working with a NAS, but with SMiD your information is automatically and strongly encrypted and stored in the cloud. It’s like making every cloud your own private cloud. SMiD also covers you against local theft, accidental loss or damage, since no unencrypted files are ever permanently stored locally.

Q: SMiD General terms and conditions?

The document containing the General Terms and Conditions applicable to the purchasing and provision of the corresponding services related to the device called SMID is available here:


Q: What are the shipping costs?

There are additional shipping costs. Shipment does not include extra fees from customs, or additional costs associated with your country. Also, there is no guarantee that this will work in your country (e.g. unknown power & connectivity issues) – there are many hurdles we need to go over until we have a complete picture on the international market. If it turns out that shipment to your country proves impossible, we will reimburse your order.

Q: Why don’t I have to pay some monthly fee?

Our goal is to make cloud storage a viable option for everyone. SMiD Pro is so simple that no maintenance is required. You will have automatic updates and you will be able to use our forum for any question and… enjoy the cloud without risks!


Q: How do I see SMiD on the user side and how can I protect my files? What kind of data can my SMiD process?

SMiD will appear in your computer as a network unit called “SMiD” (you will be able to change this name if you want in the administration panel). To protect your files you only have to drop your files into your SMiD unit.
SMiD can encrypt and store any kind of digital files, wherever you want.

Q: Where is my data stored?

You have total freedom to choose where you keep your data, so you can regularly optimize your cloud usage and costs. SMiD lets you enjoy all the advantages of cloud storage, while simplifying information security tasks and keeping your reputation, credibility and integrity intact. If you prefer not to use cloud storage, you can choose any local or private server as a provider.

Q: Can I share my information through my SMiD?

Absolutely not. Sharing encrypted information with others implies that you send them the cryptographic keys too. SMiD is completely secure, cryptographic material is always inside it. SMiD is exactly like a vault. If you want to share any document, you have to take it out from the vault and then send it.

Q: Does SMiD work if I don’t have internet connection?

Yes. With SMiD you can choose what secured files will be available even when you’re not connected to the internet. Also, you will always be able to work with providers located on your LAN.

Q: Will SMiD work with Android, Windows, Mac?

SMiD works with any type of IT infrastructure or operating system (Windows, Mac OS, Linux, iOS, Android, etc.)

Q: Do I have to install something in my computer?

Nothing at all. SMiD is a dedicated equipment that manages the encryption process. You don’t have to install any client software.

Q: What if I want to access my cloud data when I’m not at home/office?

SMiD only allows local access through the SMB protocol. Of course, you can access your SMiD from outside your LAN through a VPN connection.
We are working to develop an easier to use system without compromising your security that will be implemented soon.

Q: Can I use SMiD Pro with multiple users and/or multiple cloud provider accounts?

Yes, SMiD Pro supports up to 5 users and it can be used from one to unlimited cloud provider accounts.

Q: How does SMiD work if I have more than one storage provider?

If you have more than one storage provider, SMiD Pro will randomly select one of them to store each file. SMiD automatically does this in order to unify the storage space and it is completely transparent for you.


Q: What is the SMiD Safeguard process?

SMiD Safeguard process is crucial. It will allow you to rebuild your SMiD in a new hardware device in the future. It generates a copy of your cryptographic keys and you have to store them in a safe place.

Q: What if someone steals or smashes my SMiD?

Only you can switch on your SMiD with your unique startup key. To others, your SMiD has the same value as a brick. So don’t worry!
You can rebuild your SMiD in order to access your data again. You will need to order a new device and use your USB keys generated in the SMiD Safeguard process to do that.

Q: What if I lose my startup key?

If you performed a SMiD Safeguard process you can recover your files ordering a new SMiD. When you connect your new device, it will ask you if you want to restore a previous SMiD, you will need the two USB generated in the SMiD Safeguard process.

Q: What about backups?

SMiD does a continuous backup and offers fine grain recovery on demand. It is completely automatic and transparent for you.


Q: What are the main differences with other encryption solutions?

SMiD is a one in a kind product. It is the only one that allows the users to have exclusively under their control: a dedicated device, the auto-generated cryptographic keys and the single startup key. It allows you to turn every cloud into your own private cloud.

Q: Why a device and not software?

SMiD is a hardware device for security reasons. It’s the only reliable option to generate strong cryptographic keys. This also has another additional advantage: You have nothing to install or configure. Extra of simplicity.

Q: Why shouldn’t I trust and use any software with client-side encryption?

One of the main weaknesses of encryption software is that they run among thousands of other applications in the user’s systems and you know… they are easily infected by malware. Using a dedicated device, SMiD ensures it will remain uncompromised. Usually, these software solutions don’t have a strong key generation. They rely on a much weaker private password that needs to be remembered by a human being.

Q: Where are the cryptographic keys located? Where and when are they generated?

Your cryptographic keys are located inside your SMiD, they are generated during setup. There is absolutely no way for us –the makers of SMiD- to have access to your cryptographic keys. In order to rebuild your SMiD in a new hardware device, you have to do the SMiD Safeguard process as soon as your SMiD indicates. It generates a copy of your cryptographic keys in two USB and you have to store them in a safe place. You can do this process more times and you will get more copies of your SMiD to be store in different places.

Q: How strong is the SMiD encryption?

Really strong: Military-grade AES-256 encryption and NIST approved Random Number Generation.

Q: Is the communication between SMiD and the cloud providers secure?

Even though most cloud providers force the use of SSL as a transport security measure, in the exceptional cases where SSL is optional, SMiD forces its use.

Q: Can anybody else see my data?

Absolutely not! The information sent through SMiD to the cloud is fully encrypted. Only your SMiD with the correct credentials will be able to decrypt your data.

Q: Why does the use of SMiD remove local risks?

With SMiD only the files you are working on will be unencrypted. No unencrypted files will be permanently stored. If something happens to your office (fire, earthquake…) or someone steals your computer, or even your SMiD, you will not lose any data and your information will be safe.

Q: Why am I the only one with control over my data?

Encryption and decryption processes are always done inside the secure perimeter of the SMiD device. Nobody will have access to your cryptographic keys but you. In other solutions external encryption/decryption clients are required and they know the keys. This implies that they can access your data now and in the future.

Q: Does SMiD call home?

SMiD only connects to our own smidcloud servers through SSL to check for updates. The information sent is only the SMiD model, version and architecture, but no one will ever see what you store with cloud services, not even us.


There are no reviews yet.

Be the first to review “SMiD PRO: Cloud Privacy for Personal and Professional use”

Product Manual

If applicable, the Product Documentation, Reference Materials, CAD design(s), .STEP file(s) and/or other drawing file(s), Manuals, and Tutorials will be available for download upon purchase. The order confirmation email will include a downloadable link to the product file(s) which can also be downloaded from the My Account section if needed.

SMiD Cloud is a technology company that creates innovative cybersecurity solutions that effectively ensure the security and privacy of information stored both in the cloud and locally.

Shipping Policy

SMiD Cloud will pack the Products in accordance with its standard practices. Scheduled shipment dates are estimates only. SMiD Cloud will make reasonable efforts to meet the scheduled shipment dates, but in no event will SMiD Cloud be liable for any loss, damage, or penalty resulting from any delay in shipment or delivery for reasons outside of SMiD Cloud’s unilateral control.
If you are not satisfied with any Product purchased from the SMiD Cloud Store for any reason, you will have thirty (30) days from the date of purchase to request a full refund.

Return Policy

If you are the original end user or purchaser of the SMiD Cloud security product (the "Product") and you are not satisfied with this Product for any reason, you may return it in its original condition within thirty (30) days of the original purchase and receive a full refund.
Return Instructions:
Contact us at
1. All products must be returned in good condition, in original boxes (whenever possible), and with all accessories to ensure full credit.
2. Pack the product securely in the original package, if possible.
3. Enclose the bottom portion of the original packing slip with the product. Be sure to keep the top portion of the packing slip for your records. If you cannot send your packing slip, please include your order number, billing name, and address with the product.
4. All return shipping charges must be prepaid.
5. For your protection, we recommend that you use an Insured Parcel Post for your return.
6. Keep the Return Tracking Number from the package you are returning to ensure that the package is returned to the warehouse.
7. You can expect a refund in the same form of payment originally used for purchase within 30 days of our receiving your returned product.
Shipping costs will not be refunded for international orders. If you wish to cancel your order, or if you would like to schedule a return, contact us at with your order details.

Shipping costs

Country State Cost
Any Any $0.00

Shipping Details

If you have any questions with regards to this product, please ask us here. The product link will be included automatically.

There are no questions yet. Be the first to ask a question about this product.

Send me a notification for each new answer.

You can save in following ways:

  1. If you are a Student, School, or a Teacher, get in touch with us from your school email address for a 5% discount coupon. – See Details

  2. You can Sign Up for Oz Robotics Technology Newsletter to receive a 5% discount coupon via our monthly newsletter.

  3. Write A Review for the product you purchased from Oz Robotics and get 5% discount for your next order.

Financing Available – Buy now, pay over time with PayPal Credit

Use PayPal Credit’s digital, reusable credit line to shop online anywhere PayPal is accepted, and get 6 months special financing on purchases of $99+ every time you shop. Get a credit decision in seconds with a quick application. More Details.

You have not viewed any product yet.