Security

Your information, protected without exceptions

Your files are encrypted as soon as we receive them and only the recipients you designate can decrypt them. Access is controlled by individual keys and two-step verification.

Automatic encryption

Each file is compressed and encrypted as soon as we receive it. You don’t need to do anything: the process is automatic and invisible to you.

Keys by recipient

Each recipient has their own decryption key. Even if someone gains access to a encrypted file, they cannot read it without being the correct and verified recipient.

Continuity guaranteed

The custody plan works even if Anuxis ceases operations. Recipients with active access can always recover what they are allocated.

What we know

  • Your name and email address
  • The names of your folders
  • The email and phone number of your recipients
  • The activation dates and configured conditions
  • The event log: who accessed and when

What no one can see without authorization

  • The content of your encrypted files
  • Passwords, keys, or credentials you store
  • The content of messages to recipients
  • Sensitive financial or personal data
  • No file without the assigned recipient's key

Technical protection layers

Each data passes through multiple security levels before being stored or delivered.

AES-256 encryption

Industry standard for data at rest.

2FA verification

Email + SMS for any critical access or delivery.

Complete auditing

Immutable log of all access and delivery events.

Individual access

Each recipient can only access the folders you have assigned to them.

What happens if Anuxis shuts down?

Before winding down operations, we would provide at least 90 days' notice so you can download all your content. Recipients with active access can recover their files at any time, regardless of the platform's status. Your information is not held hostage by our continuity as a company.

Frequently asked questions about security

An attacker who accessed our servers would only obtain encrypted files. Without the individual keys of each recipient, the content is unreadable. The keys are never stored with the files.

No. Anuxis does it automatically for you. You upload the file in the same way you would on any other service and we handle the encryption. You don’t need any technical knowledge.

The account holder can reassign recipients or update their contact details at any time from the dashboard. We recommend periodically verifying that your recipients’ details are up to date.

Yes. Anuxis operates under Spanish and European law. You can review our privacy policy to see exactly what data we process, on what legal basis, how, and for how long.

Anuxis complies with applicable law and would cooperate with competent authorities if required. In that scenario, we could provide the encrypted files and the metadata we retain, but not the decryption keys for the recipients.