Security at filxo

filxo is designed to help you collect files safely and with clear control.

How files are protected

  • Files are encrypted in transit and at rest.
  • Each file request uses a unique access link.
  • Access is limited to the request owner and intended recipients.

Access and control

  • You choose who can upload files for each request.
  • Requests expire automatically after the selected period.
  • Expired requests no longer accept uploads.

Activity and visibility

  • Upload activity is recorded for each request.
  • You can see when files were uploaded and by whom.
  • You remain in control of your requests and files.

Data handling

  • filxo does not access or review uploaded files.
  • Files are used only to provide the service.
  • Temporary storage is used based on request settings and expiry.

Report a security vulnerability

We take security seriously and appreciate responsible disclosure of security vulnerabilities.

If you discover a security vulnerability, please report it to us at [email protected]. Please include:

  • A description of the vulnerability
  • Steps to reproduce the issue
  • The potential impact
  • Any suggested fixes (if available)

We will acknowledge receipt within 48 hours and work with you to address the issue responsibly. We ask that you do not publicly disclose the vulnerability until we have had a reasonable opportunity to address it.

Contact us

If you have questions about security or data handling, contact us at:

Email: [email protected]