Myota’s ShardWars Challenge Nears 10,000 Breach Attempts with Zero Successful Attacks
Global challenge validates Myota's fundamentally different approach to ransomware immunity and continuous data availability
This is a Press Release edited by StorageNewsletter.com on May 4, 2026 at 2:00 pm
To date, no participant has successfully reconstructed the protected Bitcoin key, reinforcing Myota’s claim of proven ransomware immunity.Unlike traditional cybersecurity solutions that depend on perimeter defenses, backup strategies, or post-incident recovery, Myota’s Shard and Spread technology works at the storage layer to make security intrinsic to the data itself. At write time, every file is encrypted, sharded, and distributed across multiple storage repositories. Even when attackers get through perimeter defenses, data fragments are meaningless in isolation and computationally impossible for attackers to reassemble, yet instantaneously available to data owners.
With this approach, Myota delivers its customers:
- Ransomware Immunity: Data confidentiality, integrity, and availability are intrinsic to the data itself, with no reliance on detection, response, or recovery processes
- Instant Rewind: Organizations can recover data to any point in time instantly, without backups, restores, or rehydration
- 50% Lower Storage Costs: By eliminating redundant copies and backup infrastructure, Myota reduces both capital and operational expenses
“While the ShardWars challenge is validation of Myota’s technology, by eliminating data risk at the point of creation we achieve what matters most: a zero-loss record for all of our established customers,” states Jim Walker, CEO, Myota. “What’s more, every rewind attempt in our history has been successful, complete, and instantaneous without the costs associated with typical recovery-reliant strategies.”
Myota’s architectural approach removes many attack vectors, including encryption key theft, backup compromise, and snapshot manipulation. “Most systems fail somewhere, keys get exposed, backups get hit, or there’s a weak link you can chain together,” said Gabriel Gumbs, president and Chief Hacking Officer, Myota. “Here, even if you can get through the perimeter, and put hands on fragments, they’re useless on their own. There’s no pivot point.”
Myota keeps data immutable and available regardless of breach, loss, or outage. These scenarios, whether caused by malicious activity, human error, or system failure, do not trigger recovery workflows or downtime. Instead, Myota enables immediate, complete data restoration as a native function of its architecture.
As infrastructure failures continue to disrupt organizations worldwide, Myota offers a new reality: data that remains secure, available, and instantly recoverable without complexity or unnecessary cost.
“Organizations have been investing heavily in ways to recover from attacks, outages and accidental data loss,” added Walker. “Myota represents a fundamental shift, from recovery to immunity. When data is protected at write time and cannot be reconstructed by unauthorized parties, ransomware and data exfiltration become non-events.”
The ShardWars Challenge was designed as an open proving ground to demonstrate the effectiveness of Myota’s patented Shard and Spread technology under real-world adversarial conditions. Participants were invited to attempt to reconstitute encrypted and distributed data fragments, simulating the tactics used in modern ransomware and data exfiltration attacks.











