Security & Compliance
At ProXiFi, security and responsible usage are not optional — they’re foundational. Our infrastructure is designed with layered safeguards to protect users, data, and network integrity. This section outlines the core principles and mechanisms we enforce to ensure a secure, compliant, and transparent service.
Network Security
1. Encrypted Proxy Endpoints All communication between clients and ProXiFi proxy nodes is encrypted using HTTPS and SOCKS5 over TLS where supported. This ensures data confidentiality and integrity during transit.
2. Isolation by Design Each modem is dedicated to a single user at any given time, eliminating cross-session leakage and maintaining user isolation. There’s no IP sharing unless the user is on a shared plan.
3. IP Rotation Controls Dedicated plans allow users to retain consistent IPs or manually trigger IP refreshes via API. For shared proxies, IPs are rotated at fixed intervals to reduce the likelihood of fingerprinting or bans.
4. Access Control & Authentication Access to proxy services is gated through secure tokens or username/password authentication. API keys are issued per subscription, with role-based limits.
Infrastructure Security
1. Host-Level Protections Host machines running the modem fleet are hardened with firewall rules, port restrictions, intrusion detection (IDS), and up-to-date patching. Admin access is limited and monitored.
2. Modem Management All USB modems are managed, which enforces session limits, IP cycling, and heartbeat monitoring to detect and mitigate instability or failure.
3. Traffic Monitoring & Abuse Detection Usage analytics and real-time monitoring are employed to identify abnormal usage patterns such as spamming, DDoS behavior, or high-volume scraping outside fair use. Violations result in temporary or permanent suspension.
Compliance & Legal Use
1. Acceptable Use Policy (AUP) All customers must adhere to a strict Acceptable Use Policy that prohibits illegal activity, malicious botting, fraud, or bypassing digital terms of service. Non-compliance leads to immediate deactivation.
2. Carrier Terms Adherence ProXiFi operates using legitimate SIM cards and data plans from mobile carriers. All traffic remains within policy-compliant bounds, with traffic shaping to avoid violating upstream agreements.
3. Data Privacy ProXiFi does not log the content of proxy traffic. Only metadata required for billing, performance, and abuse prevention is retained (e.g., data usage volume, session timestamps, and API calls).
4. Regional Compliance We follow best practices related to U.S. data protection laws and maintain logs for audit purposes. Expansion to new regions will follow respective local laws (e.g., GDPR, CCPA).
User Responsibility
While ProXiFi provides the platform, each user is responsible for using the service ethically, legally, and in compliance with our terms. This includes respecting rate limits, not engaging in abusive scraping, and ensuring their applications don’t infringe on others' rights.
Last updated