Security Overview

Provenix is designed with a minimal-data, cryptographically verifiable architecture.

Key Security Practices

  • Ed25519 signing
  • No text retention
  • TLS encryption for all requests
  • Strict API key authentication
  • Rate limiting
  • Regular review of dependencies and configurations

Data Handling

Provenix processes only the hash of the text. The raw text never leaves the customer's system.

Infrastructure

Hosted on secure cloud providers with industry-standard protections.

Learn More