Security

Your images never leave your device. Complete privacy and security.

Pixify is built with security and privacy as core principles. All processing happens locally on your device with zero data transmission.

Zero-Cloud Policy

Pixify operates with a strict zero-cloud policy. Your images never leave your device.

  • 100% local processing: All image processing happens on your local machine
  • No uploads: Images are never uploaded to any server, cloud, or third-party service
  • No cloud storage: We do not use any cloud storage services
  • Complete privacy: Your images remain completely private and under your control
  • Offline-first: The software works entirely offline; internet is only needed for license verification

Local Processing Explained

Pixify processes all images locally using libvips, a high-performance image processing library.

  • Binary runs entirely on your device
  • No network requests for image processing
  • No external dependencies for image conversion
  • All operations are performed in-memory when possible
  • Zero data transmission during processing

Binary Integrity Verification

Pixify verifies binary integrity to prevent tampering and ensure security.

  • SHA256 hash verification on startup
  • Automatic integrity checks during license validation
  • Tamper detection prevents unauthorized modifications
  • Signed releases on GitHub
  • Checksums provided for all downloads

No Image Storage

Pixify does not store, cache, or transmit any image data.

  • No server-side storage
  • No cloud backups
  • No analytics on image content
  • No metadata extraction for external use
  • Images are processed and immediately written to disk

License Key Security

License keys are secured using industry-standard encryption.

  • RSA-2048 encryption for license payloads
  • HMAC-SHA256 signatures for verification
  • Keys are stored locally and never transmitted except for activation
  • Revocation support for compromised keys

Zero-Knowledge & Privacy

Pixify operates with a zero-knowledge architecture. We never see or access your images.

  • 100% local processing: No streaming or partial uploads of images
  • Telemetry sends only numeric data: Token number, image count, and total size for quota management
  • No metadata retention: We do not store file names, folder paths, GPS data, or any image metadata
  • Complete isolation: Image processing happens in complete isolation from network operations
  • Post-processing sync: Usage data is transmitted only after processing completes

Transparent Usage Tracking

We track the 'quantity' not the 'content'. Only numbers are transmitted (image count, file sizes) to ensure plan compliance and protect your account from theft.

  • Usage Sync (Post-Processing Check-in): Data is sent after processing, not during
  • No constant connection required: Internet needed only at start (license verification) and end (quota update)
  • Local usage logs: You can view what's being transmitted: [Sync] Sent usage update: 15 images processed
  • Full transparency: All transmitted data is logged locally for your review
  • Privacy-first design: Processing works offline; sync is separate and optional for quota management

Data Minimalization

We collect only the absolute minimum required for license management and quota tracking.

Data We Collect

  • License Key (encrypted)
  • Machine ID (anonymized hardware identifier)
  • Image Count (total number of images processed)
  • Total Bytes (aggregate size of processed images)

Data We Never Collect

  • File Names
  • Folder Paths
  • Image Metadata (EXIF, GPS, etc.)
  • Image Content
  • Personal Information

Technical Privacy Pledge

Our commitment to privacy is backed by technical architecture, not just promises.

  • No image streaming: Images are never transmitted, even partially
  • No metadata retention: We do not extract, store, or analyze image metadata
  • Minimal data transmission: Only quota-related numbers are sent post-processing
  • Full transparency: Usage logs are available locally for your review
  • Architecture-enforced privacy: Privacy is built into the code, not added as an afterthought

Security Dashboard (Manage Your Seats)

Device tracking exists to protect you; you have full control over who uses your key and from where.

  • View all active devices: See which machines are using your license
  • Instant device deactivation: Revoke access from any device immediately if it's stolen or compromised
  • Full control: You manage your license seats from your private dashboard
  • Usage visibility: See exactly what each device is processing (count and size only, no file details)

Binary Integrity & Signing

Our binary is signed and does not contain any hidden cloud-streaming logic.

  • Code signing verification: Pixify binaries are digitally signed to ensure authenticity
  • No hidden functionality: The binary does not contain any cloud-streaming or data exfiltration code
  • Open verification: Binary structure and dependencies can be inspected
  • Transparent architecture: All network operations are explicit and logged
  • Independent security audits: Third-party security reviews confirm no hidden behavior