Security & Privacy

How F3L1X protects your data and ensures your privacy

security privacy data-protection Updated: Feb. 4, 2026

Security & Privacy

F3L1X was built with security and privacy as foundational principles, not afterthoughts.

Our Security Philosophy

"Don't rent your business. Own it."

Unlike cloud-based AI services that process your data on remote servers, F3L1X runs entirely on your local machine. Your documents, code, and conversations stay on your computer unless you explicitly choose to share them.

Data Sovereignty

Your Data Stays With You

  • Local Processing - All AI operations happen on your machine
  • No Cloud Storage - Your files are never uploaded to our servers
  • No Data Mining - We don't analyze, sell, or share your information
  • Full Control - Delete your data anytime, it's on your hardware

What We Don't Collect

Data Type Collected?
Your documents and files No
Your code and projects No
AI conversation content No
Personal information beyond account No
Usage analytics without consent No

What We Do Collect

Data Type Purpose
Email address Account management
Subscription status License verification
Device activation codes Prevent unauthorized access

Authentication Security

Secure Login

  • Google OAuth - Sign in with your existing Google account
  • No Password Storage - We never see or store your password
  • Encrypted Sessions - All authentication uses industry-standard encryption
  • Session Management - Automatic timeout for inactive sessions

Device Activation

When you install F3L1X, you'll activate your device with a simple code:

  1. F3L1X displays a 6-digit activation code
  2. Enter the code at f3l1x.tech/activate while logged in
  3. Your device is linked to your account
  4. F3L1X unlocks and you're ready to go

This ensures only you can use F3L1X on your authorized devices.

Network Security

Local-Only Communication

F3L1X components communicate only within your computer:

  • No External Connections - Realms talk to each other locally
  • Firewall Friendly - No incoming connections required
  • Isolated Network - Your AI workforce stays on your machine

Minimal Internet Usage

F3L1X only connects to the internet for:

  • Initial login and account verification
  • Periodic license validation (minimal data)
  • Optional software updates

Everything else runs offline.

Privacy Commitments

We Will Never

  • Sell your data to third parties
  • Access your local files without permission
  • Share your information with advertisers
  • Track your activity without consent

We Will Always

  • Keep your data on your machine
  • Give you control over your information
  • Be transparent about what we collect
  • Protect your data with encryption
  • Honor deletion requests promptly

Encryption Standards

  • HTTPS Everywhere - All web traffic is encrypted
  • Secure Authentication - Industry-standard token encryption
  • Local Encryption - Sensitive local data is encrypted at rest

Your Responsibilities

To keep your F3L1X installation secure:

  1. Keep Software Updated - Install updates when available
  2. Secure Your Device - Use strong device passwords/PINs
  3. Protect Your Account - Use a strong, unique password for Google
  4. Don't Share Activation Codes - Keep your device codes private
  5. Report Issues - Contact us if you notice anything suspicious

For Sensitive Work

F3L1X is ideal for work with sensitive data:

  • Medical Records - HIPAA-friendly local processing
  • Legal Documents - Attorney-client privilege preserved
  • Financial Data - No third-party exposure
  • Proprietary Code - Your IP stays yours
  • Personal Projects - Complete privacy

Incident Response

If you believe your account has been compromised:

  1. Log out of all devices at f3l1x.tech/account
  2. Change your Google account password
  3. Contact us at hello@f3l1x.tech
  4. Review your authorized devices

We take security incidents seriously and will work with you to resolve any issues.

Questions?

For security-related questions or to report vulnerabilities:

  • Email: hello@f3l1x.tech
  • Response Time: Within 24 hours for security matters

Next Steps