Pixify does not store, cache, or transmit any image data.
No server-side storage
No cloud backups
No analytics on image content
No metadata extraction for external use
Images are processed and immediately written to disk
License Key Security
License keys are secured using industry-standard encryption.
RSA-2048 encryption for license payloads
HMAC-SHA256 signatures for verification
Keys are stored locally and never transmitted except for activation
Revocation support for compromised keys
Zero-Knowledge & Privacy
Pixify operates with a zero-knowledge architecture. We never see or access your images.
100% local processing: No streaming or partial uploads of images
Telemetry sends only numeric data: Token number, image count, and total size for quota management
No metadata retention: We do not store file names, folder paths, GPS data, or any image metadata
Complete isolation: Image processing happens in complete isolation from network operations
Post-processing sync: Usage data is transmitted only after processing completes
Transparent Usage Tracking
We track the 'quantity' not the 'content'. Only numbers are transmitted (image count, file sizes) to ensure plan compliance and protect your account from theft.
Usage Sync (Post-Processing Check-in): Data is sent after processing, not during
No constant connection required: Internet needed only at start (license verification) and end (quota update)
Local usage logs: You can view what's being transmitted: [Sync] Sent usage update: 15 images processed
Full transparency: All transmitted data is logged locally for your review
Privacy-first design: Processing works offline; sync is separate and optional for quota management
Data Minimalization
We collect only the absolute minimum required for license management and quota tracking.
Data We Collect
License Key (encrypted)
Machine ID (anonymized hardware identifier)
Image Count (total number of images processed)
Total Bytes (aggregate size of processed images)
Data We Never Collect
File Names
Folder Paths
Image Metadata (EXIF, GPS, etc.)
Image Content
Personal Information
Technical Privacy Pledge
Our commitment to privacy is backed by technical architecture, not just promises.
No image streaming: Images are never transmitted, even partially
No metadata retention: We do not extract, store, or analyze image metadata
Minimal data transmission: Only quota-related numbers are sent post-processing
Full transparency: Usage logs are available locally for your review
Architecture-enforced privacy: Privacy is built into the code, not added as an afterthought
Security Dashboard (Manage Your Seats)
Device tracking exists to protect you; you have full control over who uses your key and from where.
View all active devices: See which machines are using your license
Instant device deactivation: Revoke access from any device immediately if it's stolen or compromised
Full control: You manage your license seats from your private dashboard
Usage visibility: See exactly what each device is processing (count and size only, no file details)
Binary Integrity & Signing
Our binary is signed and does not contain any hidden cloud-streaming logic.
Code signing verification: Pixify binaries are digitally signed to ensure authenticity
No hidden functionality: The binary does not contain any cloud-streaming or data exfiltration code
Open verification: Binary structure and dependencies can be inspected
Transparent architecture: All network operations are explicit and logged
Independent security audits: Third-party security reviews confirm no hidden behavior