Secure, by default

Fixie takes a security-by-design approach to protect you and your customer’s data.

  • 100% Private Traffic
  • End to End Data Encryption
  • Secure Infrastructure
  • Robust Product and Operational Security


End to End Encryption

We provide industry-standard encryption at rest (AES-256) and in transit (HTTPS/TLS).


Private Connection

Our proxies establish an encrypted tunnel between your client and the destination server. Neither Fixie nor any third party can access the contents of your traffic.


Data Minimization

We collect only essential metadata for operations and never store the content of proxied traffic.


Role-Based Access Control

Customizable collaborator permissions to control who can create proxies, invite new collaborators and more.


Hardened Infrastructure

Virtual private cloud with strict access control lists, logical data separation, encrypted point-in-time backups.


Application Security & Reliability

Automated dependency management, continuous monitoring and structured logging for real-time visibility.

Frequently Asked Questions

What data do you store?

We store minimal data required to operate the service, such as connection logs (e.g., timestamps, IP addresses), and usage metrics. We do not inspect or retain the content of proxied traffic.

Is your data encrypted?

Yes. All sensitive data at rest and in transit is encrypted using industry-standard encryption protocols (e.g., AES-256 for data at rest, TLS 1.2+ for data in transit).

Does the proxy use CONNECT tunneling?

Yes. Our proxy supports HTTP CONNECT tunneling, which allows secure end-to-end communication between your client and the destination server. Neither Fixie nor any third party can access the contents of your traffic.

How can I report security issues?

Please email any suspected vulnerabilities or security concerns to our Contact Us page. We appreciate responsible disclosure and will respond promptly.

Do you have a data retention policy?

Yes. Logs and related metadata are retained only as long as necessary for operations, typically no longer than 7 days. Historical monthly usage data is retained indefinitely.

Over 50 example integrations for the most popular languages

JavaScript, Java, Ruby, Python, Elixir, Go, and many more.