Security Overview
Provenix is designed with a minimal-data, cryptographically verifiable architecture.
Key Security Practices
- Ed25519 signing
- No text retention
- TLS encryption for all requests
- Strict API key authentication
- Rate limiting
- Regular review of dependencies and configurations
Data Handling
Provenix processes only the hash of the text. The raw text never leaves the customer's system.
Infrastructure
Hosted on secure cloud providers with industry-standard protections.