VASHIX
Request Early Access
VASHIX

Photo and video verification designed for Indian enterprise.

Early AccessSecure Cloud
C2PA 2.1·Encrypted·Data Protection

Product

  • Solutions
  • How It Works
  • Trust Score
  • Book a Demo
  • ROI Calculator
  • Changelog
  • Status PageOnline

Developers

  • Documentation
  • API Reference
  • Android SDK Guide
  • C2PA 2.1 Specification

Company

  • About
  • Blog
  • DPDP Compliance
  • Contact
  • hello@vashix.com
  • Careers

Vashix is in early access. Core verification is live. Compliance certifications are in progress.

© 2026 Vashix · All rights reserved

Privacy PolicyTerms of ServiceRefund & CancellationData Processing AgreementSecurityAccount Deletion

Made in India 🇮🇳

Security

Security at Vashix

Photo verification for regulated industries demands security that goes beyond checkboxes. Every layer of Vashix — from device hardware to cloud storage — is engineered for tamper resistance and auditability.

Encrypted at rest & in transitIndia-Only InfrastructureSecure hardware signing

Security Architecture

Hardware-Backed Signing

Every photo captured through the Vashix SDK is signed using a private key generated inside the device's secure hardware. The key is protected from export by the device's security architecture. This provides strong cryptographic evidence that a photo was captured on a specific physical device.

End-to-End Encryption

All data is encrypted in transit and at rest. Encryption keys are managed securely. Access to customer data requires audited, time-limited access grants.

C2PA Content Credentials

Every Vashix capture embeds C2PA 2.1 content credentials — an open standard for content provenance. These credentials create a tamper-evident chain from capture to claim review. Any modification to the photo after capture invalidates the credential, providing an independent verification layer beyond Vashix trust scores.

Zero-Trust Architecture

Every API request is authenticated, authorised, and logged. There are no trusted internal networks. Service-to-service communication uses mutual TLS. API keys are scoped per environment and per permission. Role-based access control enforces the principle of least privilege across the dashboard and API.

Infrastructure Security

Data Center LocationSecure Cloud Infrastructure

Migration to India-only data residency is in progress.

Encryption in TransitEncrypted

All connections encrypted in transit with modern protocols. HSTS headers enforced.

Encryption at RestEncrypted

All personal data, photos, and metadata encrypted at rest and in transit.

Network SecurityNetwork isolation and protection

Production workloads run in isolated environments with traffic inspection and DDoS protection.

Access ControlRBAC with least privilege

Role-based access control on all systems. All production access is time-limited and logged.

Logging & MonitoringFull audit trail, 1-year retention

Every API call, dashboard action, and system event is logged with timestamp, IP, and authenticated user. Logs retained minimum 1 year per DPDP Rules 2025.

Backup & RecoveryMumbai-region redundant storage

Automated daily backups with point-in-time recovery. Backups encrypted and stored within Mumbai region. 99.9% uptime SLA on Enterprise plans.

Vulnerability ManagementContinuous scanning, dependency auditing

Automated vulnerability scanning on every deployment. Dependency audit for known CVEs. Critical vulnerabilities patched within 24 hours.

Compliance & Certifications

DPDP Act 2023 & Rules 2025

Active

Incorporates features referenced in DPDP Rules 2025, including consent management, data erasure, and breach notification tooling.

SOC 2 Type II

Planned

Planned. Covers security, availability, and confidentiality trust service criteria.

ISO 27001:2022

Planned

Information Security Management System certification on roadmap. Timeline to be confirmed.

C2PA 2.1 Standard

Active

Implements the Coalition for Content Provenance and Authenticity (C2PA) standard version 2.1 for digital content provenance.

Section 63, Bharatiya Sakshya Adhiniyam 2023

Active

Captures generate certificates that include device identity, GPS coordinates, timestamps, and cryptographic signatures — information referenced in Section 63 of the Bharatiya Sakshya Adhiniyam, 2023. These certificates may be submitted as supporting evidence. Admissibility is always determined by the court on a case-by-case basis.

Responsible Disclosure Policy

We take security vulnerabilities seriously. If you believe you have found a security vulnerability in the Vashix platform, we encourage you to report it responsibly. We will work with you to understand and address the issue promptly.

How to Report

1Email your findings to hello@vashix.com with a detailed description of the vulnerability, steps to reproduce, and any proof-of-concept code
2Include your contact information so we can coordinate the disclosure with you
3Allow us reasonable time to investigate and remediate the issue before any public disclosure — we request a minimum of 90 days
4Do not access, modify, or delete data belonging to other users during your research

Our Commitment

✓We will acknowledge your report within 2 business days
✓We will provide an initial assessment within 7 business days
✓We will not take legal action against researchers who follow this policy
✓We will credit you in our security advisories (unless you prefer anonymity)
✓Critical vulnerabilities that are responsibly disclosed may be eligible for a reward at our discretion

In-Scope Systems

The following systems are in scope for security research under our responsible disclosure policy:

•Vashix API (api.vashix.com)
•Vashix Dashboard (dashboard.vashix.com)
•Vashix SDK (Android and iOS)
•Vashix documentation site (docs.vashix.com)

Out of scope: Social engineering attacks on Vashix employees, physical attacks, denial of service attacks, and third-party services (e.g., Google Cloud, Razorpay) are not in scope. Please report vulnerabilities in those systems directly to their respective security teams.

Security Questions?

For security-related inquiries, vulnerability reports, or to request our security documentation package (available to customers and prospects under NDA), contact our security team.

hello@vashix.comRequest Security Package

PGP key available on request for encrypted communication.

Related Documents

Privacy PolicyTerms of ServiceData Processing AgreementDPDP Compliance